A Modular Security Analysis of EAP and IEEE 802.11
From MaRDI portal
Publication:5738761
DOI10.1007/978-3-662-54388-7_12zbMath1400.94181OpenAlexW2590306634MaRDI QIDQ5738761
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-54388-7_12
Related Items (2)
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework ⋮ Password-authenticated TLS via OPAQUE and post-handshake authentication
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Two-round password-only authenticated key exchange in the three-party setting
- Safely Exporting Keys from Secure Channels
- On the Security of the TLS Protocol: A Systematic Analysis
- Proving the TLS Handshake Secure (As It Is)
- Session Key Distribution Using Smart Cards
- On the Security of TLS-DHE in the Standard Model
- Stronger Security of Authenticated Key Exchange
- On the Security of the Pre-shared Key Ciphersuites of TLS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Public Key Cryptography - PKC 2005
This page was built for publication: A Modular Security Analysis of EAP and IEEE 802.11