REFERENCES
- W Diffie & M Hellman, New Directions in Cryptography, In Proc of IEEE Transactions on Information Theory, vol IT-22(6), pp 644–654, 1976.
- IEEE P1363/D13, IEEE Standard Specifications for Public Key Cryptography, IEEE, November 12, 1999.
- IEEE PI 363.2, Standard Specifications for Password-based Public Key Cryptographic Techniques, Draft version 19, December 17, 2004
- http://grouper.ieee.Org/groups/802/l1/index.html
- LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, 1999 Edition, 1999.
- S Wong, The Evolution of Wireless Security in 802.11 Networks: WEP, WPA and 802.11 Standards, SANS Institute, March 2003.
- N Borisov, I Goldberg & D Wagner, Intercepting Mobile Communications: The Insecurity of 802.11, In Proc of the Seventh Annual International Conference on Mobile Computing and Networking, July 2001.
- IEEE 802. 1x, Port Based Network Access Control, http://www.ieee802.org/l/pages/802.1x.html
- L Blunk & J Vollbrecht, PPP Extensible Authentication Protocol (EAP), IETF RFC 2284, March 1998.
- B Aboba, L Blunk, J Vollbrecht, J Carlson & H Levkowetx, Extensible Authentication Protocol (EAP), IETF RFC 3748, June 2004.
- IETF (Internet Engineering Task Force), Challenge Handshake Authentication Protocol, RFC 1994, August 1996.
- J Wright, Weaknesses in LEAP Challenge/Response, available at http://home.jwu.edu/jwright/presentations/asleap-defcon.pdf
- H Haverinen & J Salowey, Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM), draft-haverinen-pppext-eap-sim-16.txt, December 2004.
- J Arkko & H Haverinen, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), draft-arkko-pppext-eap-aka-15.txt, December 2004.
- S Patel, Analysis of EAP-SIM Session Key Agreement, available at http://www.drizzle.com/-aboba/EAP/AnalyisOfEAP.pdf
- B Aboba & D Simon, PPP EAP TLS Authentication Protocol, IETF RFC 2716, October 1999.
- S M Bellovin & M Merritt, Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks, In Proc of IEEE Symposium on Security and Privacy, pp 72–84, 1992.
- Phoenix Technologies Inc., Research Papers on Strong Password Authentication, available at http://www.integritysciences.com/links.html
- M Lamos, L Gong, J Saltzer & R Needham, Reducing Risks from Poorly Chosen Keys, In Proc of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp 14–18, 1989.
- L Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks, In Proc of IEEE Computer Security Foundation Workshop, pp 24–29, 1995
- S Halevi & H Krawczyk, Public-Key Cryptography and Password Protocols, In ACM Transactions on Information and System Security, vol 2, no 3, pp 230–268, ACM Press, August 1999.
- M Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, In Proc of 7th Annual Conference on Computer and Communications Security, pp 63–72, ACM, 1999.
- Seong Han Shin, Kazukuni Kobara & Hideki Imai, Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA, In Proc of Applied Cryptography and Network Security 2005, LNCS 3531, Springer-Verlag, June 2005.
- A Shamir, How to Share a Secret, In Proc of Communications of the ACM, vol 22(11), pp 612–613, 1979.
- M Bellare & P Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In Proc of ACM CCS '93, pp 62–73, 1993.
- S B Wilson, D Johnson & A Menezes, Key Agreement Protocols and their Security Analysis, In Proc of IMA International Conference on Cryptography and Coding, December 1997.
- D S Wong, H H Fuentes & A H Chan, The Performance Measurement of Cryptographic Primitives on Palm Devices, In Proc of the 17th Annual Computer Security Applications Conference, December 2001.