최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국해양정보통신학회논문지 = The journal of the Korea Institute of Maritime Information & Communication Sciences, v.9 no.6, 2005년, pp.1323 - 1332
박동국 (순천대학교 정보통신공학부) , 조경룡 (순천대학교 정보통신공학부)
EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possi...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
L. Blunk and J. Vollbrecht, 'PPP Extensible Authentication Protocol (EAP),' IETF RFC 2284, March 1998
IEEE Standard 802.1X, Standards for Local and Metropolitan Area Networks: Port-Based Access Control, 2001
IEEE, 'LAN MAN standards of the IEEE Computer Society: wireless LAN medium access control (MAC)and physical layer(PHY)specification', IEEE Standard 802.11, 1997
B. Lolyd, et aI. 'PPP Authentication Protocols', IETF RFC 1992, October 1992
W. Simpson, 'PPP Challenge Handshake Authentication Protocol (CHAP)', IETF RFC 1994, August 1996
G. Zorn, 'Deriving Keys for use with Microsoft Point-to-Point (MPPE)', IETF draft, Octo-ber 2000
B. Schneier, Applied Cryptography, 2nd ed. Wiley, 1996, pp. 171-173
http://www.cisco.com/warp/public/784/packet/exclusive/apr02.htmI
B. Aboba and D. Simon, 'PPP EAP TLS Authentication Protocol,' IETF RFC 2716, October 1999
L.C. Paulson, 'Inductive Analysis of the Internet Protocol TLS', ACM Transactions on Computer and System Security 23, 1999, pp. 332-351
P. Funk and S. Blake-Wilson, 'EAP Tunneled TLS Authentication Protocol (EAP-TTLS)', IETF draft, July 2004
T. Wu, 'The Secure Remote Password Protocol', in Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, Mar 1998, pp. 97-111
J. Carlson, B. Aboba and H. Haverinen, 'EAP SRP-SHAI Authentication Protocol', IETF draft, July 2001
S.M. Bellovin and M. Merritt, 'Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks', Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, 1992, pp.72-84
S.M. Bellovin and M. Merritt, 'Cryptographic Protocols for Secure Communications', U.S. Patent #5,241,599,31 August 1993
D. Jablon, 'Extended password methods immune to dictionary attack', In WETICE '97 Enterprise Security Workshop, Cambridge, MA, June 1997
D. Jablon, 'Cryptographic methods Is for remote authentication', U.S. Patent #6,226,383, 1 May 2001
http://www.ietf.org/ietf/IPR/LUCENT-SRP
http://www.ietf.org/ietf/IPR/WU-SRP
http://www.ietf.org/ietf/IPR/PHOENIX-SRP-RFC2945.txt
DongGook Park, et aI., 'Forward secrecy and its application to future mobile communications security', PKC 2000, Lecture Note in Computer Science (LNCS) 1751, Springer-Verlag, 2000
N. Doraswamy and D. Harkins, IPSec: the new security standard for the Internet, internets, and virtual private networks, 2nd Ed., Prentice Hall, 2003
H. Andersson et aI., 'Portected EAP protocol (PEAP)', IETF draft, 23 Februry 2002
L. Salgarelli, 'EAP SKE authentication and key exchange protocol', IETF draft, Nov 1, 2003
※ AI-Helper는 부적절한 답변을 할 수 있습니다.