Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
暂无分享,去创建一个
[1] Gavin Lowe. A Family of Attacks upon Authentication Protocols , 1997 .
[2] S. Wang,et al. IEEE standard 802.16: a technical overview of the WirelessMAN/sup TM/ air interface for broadband wireless access , 2002, IEEE Communications Magazine.
[3] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[4] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[5] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[6] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[8] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[9] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[10] Chin-Tser Huang,et al. Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.