暂无分享,去创建一个
[1] Muhammad Sher,et al. Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems , 2015, Journal of Medical Systems.
[2] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[3] Xiong Li,et al. An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement , 2014, Secur. Commun. Networks.
[4] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[5] Heung Youl Youm,et al. Extensible Authentication Protocol Overview and Its Applications , 2009, IEICE Trans. Inf. Syst..
[6] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[7] Lei Han,et al. A Threat Analysis of The Extensible Authentication Protocol , 2006 .
[8] Dan Simon,et al. Extensible Authentication Protocol (eap) Key Management Framework , 2007 .
[9] Thomas D. Wu. The Secure Remote Password Protocol , 1998, NDSS.
[10] Scott Ruoti,et al. Strengthening Password-based Authentication , 2016, WAY@SOUPS.
[11] Hyunuk Hwang,et al. A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[12] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[13] Tao Xie,et al. How to Break EAP-MD5 , 2012, WISTP.
[14] S. Raja Rajeswari,et al. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks , 2016, TheScientificWorldJournal.
[15] Bernard Aboba,et al. RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP) , 2003, RFC.
[16] Daniel Rosner,et al. A practical analysis of EAP authentication methods , 2010, 9th RoEduNet IEEE International Conference.