Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA
暂无分享,去创建一个
[1] Paul E. Hoffman,et al. Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms , 2011, RFC.
[2] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[3] Muxiang Zhang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Transactions on Wireless Communications.
[4] Stig Fr. Mjølsnes,et al. A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols , 2012, MMM-ACNS.
[5] James H. Burrows,et al. Secure Hash Standard , 1995 .
[6] Christopher Thompson,et al. Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android , 2013, WOOT.
[7] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.
[8] C. Kaufman. Internet Key Exchange (IKEv2) Protocol", RFC 4306 , 2005 .
[9] Hao Zhou,et al. Tunnel Extensible Authentication Protocol (TEAP) Version 1 , 2014, RFC.
[10] Mark Ryan,et al. New privacy issues in mobile telephony: fix and verification , 2012, CCS.
[11] Simon Blake-Wilson,et al. Funk Request for Comments : 5281 Unaffiliated Category : Informational , 2008 .
[12] Donald E. Eastlake,et al. Randomness Requirements for Security , 2005, RFC.
[13] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[14] Dan Simon,et al. Extensible Authentication Protocol (eap) Key Management Framework , 2007 .
[15] Hugo Krawczyk,et al. Perfect Forward Secrecy , 2011, Encyclopedia of Cryptography and Security.
[16] Jari Arkko,et al. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.
[17] Stephen Farrell,et al. Pervasive Monitoring Is an Attack , 2014, RFC.
[18] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[19] Barry Leiba,et al. Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words , 2017, RFC.
[20] Jari Arkko,et al. The Network Access Identifier , 2005, RFC.
[21] Thomas Narten,et al. Guidelines for Writing an IANA Considerations Section in RFCs , 1998, RFC.
[22] Jari Arkko,et al. Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2 , 2005, RFC.
[23] Scott O. Bradner,et al. Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.
[24] Paul E. Hoffman,et al. Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.
[25] Jari Arkko,et al. Network Discovery and Selection Problem , 2008, RFC.
[26] Elisa Bertino,et al. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.
[27] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[28] Ravishankar Borgaonkar,et al. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..
[29] Jari Arkko,et al. Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.