A scheme for authentication and dynamic key exchange in wireless networks
暂无分享,去创建一个
Uri Blumenthal | Sarvar Patel | Luca Salgarelli | Juan A. Garay | Milind M. Buddhikot | Scott C. Miller | Dorothy Stanley
[1] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[2] Moti Yung,et al. Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..
[3] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[4] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[5] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[6] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[7] Hugo Krawczyk,et al. SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[8] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[9] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[10] Ben McClure,et al. A security architecture for the Internet Protocol , 1998 .
[11] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.
[12] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[13] Jari Arkko,et al. Diameter Base Protocol , 2003, RFC.