Analyzing and Fixing the Vulnerabilities of ASK Protocol |
Ryu Gab Sang
(동신대학교 멀티미디어공학과)
Kim Il Gon (고려대학교 컴퓨터학과) Kim Hyun Seok (고려대학교 컴퓨터학과) Lee Ji Yeon (고려대학교 컴퓨터학과) Kang In Hye (서울시립대학교 컴퓨터학과) Choi Jin Young (고려대학교 컴퓨터학과) |
1 | M. J. Beller, L. -F. Chang and Y. Yacobi, 'Privacy and authentication on a portable communications system,' Proceedings of the International Computer Symposium, Vol.1, pp.821-829, 1994 |
2 | A. Aziz and W. Diffie, 'Privacy and authentication for wireless local area networks,' IEEE Personal Commun., First Quarter 25 31, 1994 DOI ScienceOn |
3 | W. Stallings, NETWORK SECURITY ESSENTIALS : Applications and Standards, Second Edition, page 70, Prentice-Hall, 1999 |
4 | M. Aydos, B. Sunar, and C. K. Koc, 'An elliptic curve cryptography based authentication and key agreement protocol for wireless communication,' presented at the 2nd Int. Workshop Discrete Algorithms and Methods for Mobility, Dallas, TX, Oct. 1998 |
5 | Formal Systems (Europe) Ltd. Failure Divergence Refinement-FDR2 User Manual. 1999 |
6 | Z. Dang, 'Using the ASTRAL Model Checker for Cryptographic Protocol Analysis,' Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997 |
7 | C. A. R. Hoare, Communicating Sequential Processes, Prentice-Hall, 1985 |
8 | P. Y. A. Ryan and S. A. Schneider, modelling and analysis of security protocols: the CSP Approach, Addison-Wesley, 2001 |
9 | G. Lowe, 'Casper: A Compiler for the Analysis of Security Protocols,' 10th IEEE Computer Security Foundations Workshop, 1997 DOI |
10 | A. Roscoe and M. Goldsmith, 'The Perfect Spy for Model-Checking Cryptoprotocols,' Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997 |
11 | T. Coffey and R. Dojen, 'Analysis of a mobile communication security protocol,' Proceeding of the 1st international symposium on Information and communication technologies, pp. 322-328, 2003 |
12 | G. Lowe, 'Breaking and Fixing the Needham-Schroeder Public-Key Protocol,'TACAS 96, pp.147-166, 1996 |
13 | I. G. Kim and J. Y. Choi, 'Formal verification of PAP and EAP- MD5 Protocols in wireless networks : FDR Model Checking,' 18th AINA, pp.264-269, 2004 DOI |