22
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

How to Establish Secure Channels for Wireless Communications

, &
Pages 229-238 | Published online: 26 Mar 2015

REFERENCES

  • W Diffie & M Hellman, New Directions in Cryptography, In Proc of IEEE Transactions on Information Theory, vol IT-22(6), pp 644–654, 1976.
  • IEEE P1363/D13, IEEE Standard Specifications for Public Key Cryptography, IEEE, November 12, 1999.
  • IEEE PI 363.2, Standard Specifications for Password-based Public Key Cryptographic Techniques, Draft version 19, December 17, 2004
  • http://grouper.ieee.Org/groups/802/l1/index.html
  • LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, 1999 Edition, 1999.
  • S Wong, The Evolution of Wireless Security in 802.11 Networks: WEP, WPA and 802.11 Standards, SANS Institute, March 2003.
  • N Borisov, I Goldberg & D Wagner, Intercepting Mobile Communications: The Insecurity of 802.11, In Proc of the Seventh Annual International Conference on Mobile Computing and Networking, July 2001.
  • IEEE 802. 1x, Port Based Network Access Control, http://www.ieee802.org/l/pages/802.1x.html
  • L Blunk & J Vollbrecht, PPP Extensible Authentication Protocol (EAP), IETF RFC 2284, March 1998.
  • B Aboba, L Blunk, J Vollbrecht, J Carlson & H Levkowetx, Extensible Authentication Protocol (EAP), IETF RFC 3748, June 2004.
  • IETF (Internet Engineering Task Force), Challenge Handshake Authentication Protocol, RFC 1994, August 1996.
  • J Wright, Weaknesses in LEAP Challenge/Response, available at http://home.jwu.edu/jwright/presentations/asleap-defcon.pdf
  • H Haverinen & J Salowey, Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM), draft-haverinen-pppext-eap-sim-16.txt, December 2004.
  • J Arkko & H Haverinen, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), draft-arkko-pppext-eap-aka-15.txt, December 2004.
  • S Patel, Analysis of EAP-SIM Session Key Agreement, available at http://www.drizzle.com/-aboba/EAP/AnalyisOfEAP.pdf
  • B Aboba & D Simon, PPP EAP TLS Authentication Protocol, IETF RFC 2716, October 1999.
  • S M Bellovin & M Merritt, Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks, In Proc of IEEE Symposium on Security and Privacy, pp 72–84, 1992.
  • Phoenix Technologies Inc., Research Papers on Strong Password Authentication, available at http://www.integritysciences.com/links.html
  • M Lamos, L Gong, J Saltzer & R Needham, Reducing Risks from Poorly Chosen Keys, In Proc of the 12th ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp 14–18, 1989.
  • L Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks, In Proc of IEEE Computer Security Foundation Workshop, pp 24–29, 1995
  • S Halevi & H Krawczyk, Public-Key Cryptography and Password Protocols, In ACM Transactions on Information and System Security, vol 2, no 3, pp 230–268, ACM Press, August 1999.
  • M Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, In Proc of 7th Annual Conference on Computer and Communications Security, pp 63–72, ACM, 1999.
  • Seong Han Shin, Kazukuni Kobara & Hideki Imai, Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA, In Proc of Applied Cryptography and Network Security 2005, LNCS 3531, Springer-Verlag, June 2005.
  • A Shamir, How to Share a Secret, In Proc of Communications of the ACM, vol 22(11), pp 612–613, 1979.
  • M Bellare & P Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In Proc of ACM CCS '93, pp 62–73, 1993.
  • S B Wilson, D Johnson & A Menezes, Key Agreement Protocols and their Security Analysis, In Proc of IMA International Conference on Cryptography and Coding, December 1997.
  • D S Wong, H H Fuentes & A H Chan, The Performance Measurement of Cryptographic Primitives on Palm Devices, In Proc of the 17th Annual Computer Security Applications Conference, December 2001.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.