Mutual authentication of B3G devices within personal distributed environments
暂无分享,去创建一个
[1] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[2] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[3] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[4] William Allen Simpson,et al. PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.
[5] Glen Zorn,et al. Protected EAP Protocol (PEAP) Version 2 , 2004 .
[6] Tara M. Swaminatha,et al. Wireless Security and Privacy: Best Practices and Design Techniques , 2002 .
[7] A. Tomlinson,et al. Security challenges in the personal distributed environment , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[8] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] John Dunlop,et al. A personal distributed environment for future mobile systems , 2003 .
[11] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[12] Florent Bersani. EAP shared key methods: a tentative synthesis of those proposed so far , 2004 .
[13] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.