Security Analysis and Authentication Improvement for IEEE 802.11i Specification.
Xinyu XingElhadi M. ShakshukiDarcy G. BenoitTarek R. SheltamiPublished in: GLOBECOM (2008)
Keyphrases
- security analysis
- public key
- smart card
- security requirements
- user authentication
- authentication protocol
- high security
- encryption scheme
- elliptic curve cryptography
- mutual authentication
- security model
- security properties
- authentication scheme
- image encryption
- private key
- public key cryptography
- security mechanisms