Documentos de Académico
Documentos de Profesional
Documentos de Cultura
00 ET0909CD - Algoritmos de Protocolos de Seguridad en Redes de Computadoras Inalámbricas PDF
00 ET0909CD - Algoritmos de Protocolos de Seguridad en Redes de Computadoras Inalámbricas PDF
1
Agosto - Diciembre 2009
Revista Espectro Tecnolgico / Instituto de Ingeniera y Tecnologa / Universidad Autnoma de Ciudad Jurez
2
Agosto - Diciembre 2009
Revista Espectro Tecnolgico / Instituto de Ingeniera y Tecnologa / Universidad Autnoma de Ciudad Jurez
3
Agosto - Diciembre 2009
Revista Espectro Tecnolgico / Instituto de Ingeniera y Tecnologa / Universidad Autnoma de Ciudad Jurez
REFERENCIAS:
[1]) TS 33.102: Security architecture, version 4.2.0,
release 4. Third Generation Partnership Project Technical Specification Group. 2001
[2] Borisov N., Goldber I. y Wagner D.,
Intercepting mobile communications : the
insecurity of 802.11x, Procc. 7th. International
conference on mobile computing and networking,
2001.
[3] Mishra A. y Arboaught W., Security analisysy
of
the
IEEE802.11x
standar,
http://www.cs.umd.edu/waa/wireless.htm, 2002.
[3]TR 33.902: Formal analysis of the 3G
authentication
protocol.
Third
Generation
Partnership Project - Authentication and Key
Agreement (AKA).
[4] M. Zhang and Y. Fang, Security analysis and
enhancements of 3GPP authentication and key
agreement protocol, IEEE Trans. Wireless
Commun., vol. 4, no. 2, pp. 734742, Mar. 2005.
[5] D. A. Cooper and K. P. Birman, Preserving
privacy in a network of mobile computers, in Proc.
IEEE Symposium Research Security Privacy, 1995,
pp. 2638.
[6] R. Molva, D. Samfat, and G. Tsudik,
Authentication of mobile users, IEEE Network,
vol. 8, no. 2, pp. 2634, Mar./Apr. 1994.
[7] W.-B. Lee and C.-K. Yeh, A new delegationbased authentication protocol for use in portable
communication systems, IEEE Trans. Wireless
Commun., vol. 4, no. 1, pp. 5764, Jan. 2005.
[8] K. Zhang, Threshold proxy signature
schemes, in Proc. 1st InternationalInform. Security
Workshop, 1997, pp. 191197.
[9] D. Johnson, A. Menezes, and S. Vanstone, The
elliptic curve digital signature algorithm (ECDSA),
International J. Inform. Security, vol. 1, no. 1, pp.
3663, Aug. 2001.
[10] Aissi S., Dabbous N. y Prasad A., Security
for mobile networks and platforms, Ed. Universal
personal communications, 2006.
4
Agosto - Diciembre 2009