|
[1] C.I. Fan, Y.H. Lin and R.H. Hsu, ”Remote password authentication scheme with smart cards and biometrics,” IEEE Telecommunications Conference, 2006 [2] C.H. Lin and Y.Y. Lai, ”A flexible biometrics remote user authentication Scheme, ”Computer Standards & Interfaces, Vol. 27, No. 1, pp. 19-23, 2004. [3] E. J. Yoon and K. Y. Yoo, ”An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs,” ICCS 2006, Part II, LNCS 3992, pp. 1000-1007, 2006. [4] F. Hao, R. Anderson, and J. Daugman, ”Combining Crypto with Biometrics Effectively,” IEEE Transactions on Computers, Vol 55, No. 1, pp. 1081-1088, 2006 [5] J. C. Chen, M. C. Jiang, and Y. W. Liu, ”Wireless LAN Security and IEEE 802.11i,” IEEE Wireless Communications, vol. 12, pp. 27-36, 2005 [6] J. Chen and Y. Wang, ”Extensible authentication protocol (EAP) and IEEE 802.1x tutorial and empirical experience,” IEEE Communications Magazine, vol. 43, no. 12, pp. 26-32, 2005 [7] W. S. Juang, and J. L. Wu, ”Two efficient two-factor authenticated key exchange protocols in public wireless LANs,” Computers and Electrical Engineering, pp. 33-40, 2009. [8] Y. Lee and T. Kwon, ”An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards,” ICCSA 2006, Lecture Notes in Computer Science, Vol. 3981, pp. 915-922, 2006. [9] Y. M. Park and S. K. Park, ”Two factor authenticated key exchange (TAKE) protocol in public wireless LANs,” IEICE Transaction on Communication, vol. E87-B, no. 5, pp. 1382-1385, 2004. [10] ANSI/IEEE Standard 802.11, ”Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” December 1999 [11] IEEE Standard 802.1X-2001, ”Port-Based Network Access Control,” June 2001 [12] B. Adoba, L. Blunk, J. Vollbrecht, J. Carlson, and E. Levkowetz, ” Extensible Authentication Protocol (EAP),” RFC 3748, June 2004. [13] B. Adoba, D. Simon, and R. Hurst, ”The EAP-TLS Authentication Protocol,” RFC 5216, March 2008. [14] D. Stanley, J.Walker, and B. Aboba, ”Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs,” RFC 4017, March 2005. [15] E. Rescorla, ”Diffie-Hellman Key Agreement Method,” RFC 2631, June 1999. [16] N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, ”The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST),” RFC 4851, May 2007. [17] P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese, ”IEEE 802.1X Remote Authentication Dial In User Service (RADIUS),” RFC 3580, September 2003. [18] T. Dierks and C. Allen, ”The TLS Protocol Version 1.0,” RFC 2246, January 1999. [19] W. Simpson, ”PPP Challenge Handshake Authentication Protocol (CHAP),” RFC 1994, August 1996. [20] D. Jablon: draft-jablon-speke-02.txt, ”The SPEKE Password-Based Key Agreement Methods,” IETF Draft, October 2003. [21] H. Andersson, S. Josefsson, G. Zorn, D. Simon, and A. Parlekar: draft-josefsson-pppexteap- tls-eap-04.txt, ”Protected EAP Protocol (PEAP),” IETF Draft, September 2002. [22] P. Funk and B. W. Simon: draft-funk-eap-ttls-v0-00.txt, ”EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0),” IETF Draft, February 2005. [23] Matthew Gast, 802.11 Wireless Network: The Definitive Guide, O’REILLY, 2002 [24] Cisco SAFE, ”WLAN security in Depth,” available at http://www.cisco.com/warp /public/cc/so/cuso/epso/sqfr/safwl wp.pdf [25] Dictionary Attack on Cisco LEAP available at http://www.cisco.com/warp/public /707/cisco-sn-20030802-leap.shtml [26] IEC On-Line Education, ”EAP Methods for 802.11 Wireless LAN Security,” available at http://www.iec.org/online/tutorials/eap methods/index.asp
|