|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 30 occurrences of 22 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
194 | David Q. Liu, Mark Coslow |
Extensible authentication protocols for IEEE standards 802.11 and 802.16. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 47, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extensible authentication protocol, wireless, IEEE 802.11, EAP |
107 | Seong-Soo Park 0001, Jong-Hyouk Lee, Tai-Myoung Chung |
Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I, pp. 885-896, 2009, Springer, 978-3-642-02453-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proxy MIPv6, EAP-TLS, Authentication, Certificate, BAN Logic |
94 | Ulrike Meyer, Jared Cordasco, Susanne Wetzel |
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2005, Cologne, Germany, September 2, 2005, pp. 1-13, 2005, ACM, 1-59593-143-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS-KS, distributed DSS, inter-provider roaming, micropayment scheme, WLAN, secret sharing, PKI, 802.11i |
89 | Pascal Urien, Mesmin Dandjinou |
Designing Smartcards for Emerging Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 165-178, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Wen-Ting Wu, Jyh-Cheng Chen, Kai-Hsiu Chen, Kuo-Pao Fan |
Design and implementation of WIRE Diameter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITRE ![In: ITRE 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings, pp. 428-433, 2005, IEEE, 0-7803-8933-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
81 | Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis |
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 287-296, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
AKA, WLAN, UMTS, PKI, TLS, EAP |
73 | Hyung-Woo Lee |
Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 122-131, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Pascal Urien, Mesmin Dandjinou |
The OpenEapSmartcard platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Net-Con ![In: Network Control and Engineering for QoS, Security and Mobility, IV, Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005, Proceedings, pp. 75-86, 2005, Springer, 978-0-387-49689-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
javacards, Security, WLAN, smartcards |
54 | Yao Zhao, Chuang Lin 0002, Hao Yin |
Security Authentication of 3G-WLAN Interworking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 429-436, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | John Preuß Mattsson, Mohit Sethi |
EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9190, pp. 1-31, February 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
48 | Christina Brzuska, Håkon Jacobsen, Douglas Stebila |
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 87, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Christina Brzuska, Håkon Jacobsen, Douglas Stebila |
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pp. 670-698, 2016, Springer, 978-3-662-49889-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
42 | Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant |
AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, VANET 2005, Cologne, Germany, September 2, 2005, pp. 79-80, 2005, ACM, 1-59593-141-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
inter-vehicular routing, security, ad hoc networks, AAA, vehicular communications |
42 | Douglas E. Ennis |
The wireless tightrope: an economical, secure, and user friendly approach for the wireless campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 62-67, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EAP-TLS, MSCHAPv2, PEAP, SSL certificates, SWAN, WLCCP, WEP, 802.1X |
42 | Jon Allen, Jeff Wilson |
Securing a wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 213-215, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
34 | Qianli Wang |
Applying SPIN checker on 5G EAP-TLS authentication protocol analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Inf. Syst. ![In: Comput. Sci. Inf. Syst. 21(1), pp. 21-36, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Naiguang Zhu, Jie Xu 0038, Baojiang Cui |
Formal Analysis of 5G EAP-TLS 1.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data & Web Technologies - The 12th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2024, Naples, Italy, 21-23 February 2024, pp. 140-151, 2024, Springer, 978-3-031-53554-3. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Jingjing Zhang 0005, Lin Yang, Weipeng Cao, Qiang Wang 0020 |
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 23674-23688, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi |
Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 14(3), pp. 277-294, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Jingjing Zhang 0005, Qiang Wang 0020, Lin Yang, Tao Feng |
Formal Verification of 5G-EAP-TLS Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Fourth IEEE International Conference on Data Science in Cyberspace, DSC 2019, Hangzhou, China, June 23-25, 2019, pp. 503-509, 2019, IEEE, 978-1-7281-4528-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Bahareh Shojaie, Iman Saberi, Mazleena Salleh |
Enhancing EAP-TLS authentication protocol for IEEE 802.11i. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 23(5), pp. 1491-1508, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015, pp. 1-5, 2015, IEEE Computer Society, 978-1-5090-0478-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Fouad Amine Guenane, Nouha Samet, Guy Pujolle, Pascal Urien |
A strong authentication for virtual networks using EAP-TLS smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIIS ![In: Global Information Infrastructure and Networking Symposium, GIIS 2012, Choroni, Venezuela, December 17-19, 2012, pp. 1-6, 2012, IEEE, 978-1-4673-5217-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Fouad Amine Guenane, Guy Pujolle |
Strong virtual network authentication using EAP-TLS smart-cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudNet ![In: 1st IEEE International Conference on Cloud Networking, CloudNet 2012, Paris, France, November 28-30, 2012, pp. 197-199, 2012, IEEE, 978-1-4673-2797-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Pascal Urien, Christophe Kiennert |
A New Key Delivering Platform Based on NFC Enabled Android Phone and Dual Interfaces EAP-TLS Contactless Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCASE ![In: Mobile Computing, Applications, and Services - Third International Conference, MobiCASE 2011, Los Angeles, CA, USA, October 24-27, 2011. Revised Selected Papers, pp. 387-394, 2011, Springer, 978-3-642-32319-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Pascal Urien, Marc Pasquet, Christophe Kiennert |
A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2011 International Conference on Collaboration Technologies and Systems, CTS 2011, Philadelphia, Pennsylvania, USA, May 23-27, 2011, pp. 476-483, 2011, IEEE, 978-1-61284-636-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Yuh-Min Tseng |
USIM-based EAP-TLS authentication protocol for wireless local area networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(1), pp. 128-136, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Dan Simon, Bernard Aboba, Ryan Hurst |
The EAP-TLS Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5216, pp. 1-34, March 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Carolin Latze, Ulrich Ultes-Nitsche |
A Proof-of-Concept Implementation of EAP-TLS with TPM Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008, pp. 1-12, 2008, ISSA, Pretoria, South Africa, 978-1-86854-693-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
34 | Mohamad Badra, Pascal Urien |
Adding Identity Protection to EAP-TLS Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007, pp. 2951-2956, 2007, IEEE, 1-4244-0658-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Pascal Urien, Mohamad Badra |
Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 157-163, 2006, INSTICC Press, 972-8865-63-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
34 | Jared Cordasco, Ulrike Meyer, Susanne Wetzel |
Implementation and Performance Evaluation of EAP-TLS-KS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006, pp. 1-12, 2006, IEEE, 1-4244-0423-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Mohamad Badra, Pascal Urien |
Enhancing WLAN Security by Introducing EAP-TLS Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 342-349, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
34 | Bernard Aboba, Dan Simon |
PPP EAP TLS Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2716, pp. 1-24, October 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Levente Buttyán, László Dóra |
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2009, Kos Island, Greece, 15-19 June, 2009, pp. 1-6, 2009, IEEE Computer Society, 978-1-4244-4439-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Marc Barisch |
Modelling the impact of virtual identities on communication infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 45-52, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
aaa performance, authentication load, identity management, virtual identities |
27 | Binod Vaidya, YoungJin Kim, Eung-Kon Kim, Seung Jo Han |
Investigating Authentication Mechanisms for Wireless Mobile Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 902-911, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Tarun Joshi, Anindo Mukherjee, Dharma P. Agrawal |
Exploiting Mobility Patterns to Reduce Re-Authentication Overheads in Infrastructure WLAN Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1423-1426, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|