1 |
IEEE, "IEEE Standard for information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 11:Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications Amendment 6:Medium Access Control(MAC) Security Enhancements," IEEE 802.11i, 2004
|
2 |
B. Pboba, D. Simon, "PPP EAP TLS authentication procotol," RFC 1510, IETF, 1999
|
3 |
R. Blom, "An optimal class of symmetric key generation systems," Advances in Cryptology, Proc. of Eurocrypt 84, pp. 335-338, 1984
|
4 |
A. Mishra, M. Shin, N.L. Petroni, T.C. Clancy, W.A. Arbaugh, "Pro-active Key Distribution using Neighbor Graphs," IEEE Wireless Communications, Vol. 11, No. 1, pp. 26-36, 2004
DOI
ScienceOn
|
5 |
강유성, 오경희, 정병호, "무선랜 보안기술의 진화동향 및 전망," 전자통신동향분석, 제 18권, 제4호, pp. 36-46, 2003
|
6 |
E. Bresson, O. Chevassut, A. Essiari, D. Pointcheval, "Mutual Authentication and Group Key Agreement for Low-power Mobile Devices," Computer Communications, Vol. 27, No. 17, pp. 1730-1737, 2004
DOI
ScienceOn
|
7 |
C. Park, C. Hur, C. Kim, Y. Shin, H. Yoon, "Pre-authentication for Fast handoff in Wireless Mesh Networks with Mobile APs," Proc. of the 7th Int. Workshop on Information Security Applications, pp. 670-694, 2006
|