Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
T. TsukauneYosuke TodoMasakatu MoriiPublished in: AsiaJCIS (2012)
Keyphrases
- remote user authentication scheme
- smart card
- secret key
- security mechanisms
- user authentication
- secure communication
- private key
- block cipher
- stream cipher
- security requirements
- authentication scheme
- information security
- security analysis
- security protocols
- authentication protocol
- key distribution
- access control
- cryptographic algorithms
- resource constrained
- security issues