{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:05:22Z","timestamp":1725465922076},"publisher-location":"Boston","reference-count":16,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387231978"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-23198-6_4","type":"book-chapter","created":{"date-parts":[[2006,3,11]],"date-time":"2006-03-11T19:31:13Z","timestamp":1142105473000},"page":"43-55","source":"Crossref","is-referenced-by-count":0,"title":["A Kerberos-Based Authentication Architecture for WLANS"],"prefix":"10.1007","author":[{"given":"Mohamed Ali","family":"Kaafar","sequence":"first","affiliation":[]},{"given":"Lamia Ben","family":"Azzouz","sequence":"additional","affiliation":[]},{"given":"Farouk","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Scott Fluhrer et al., \u201cWeaknesses in the Key Scheduling Algorithm of RC4\u201d. In proceedings of the eighth Annual Workshop on Selected Areas in Cryptography, Toronto, August 2001.","DOI":"10.1007\/3-540-45537-X_1"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Nikita Borisov et al., \u201cIntercepting Mobile Communications: The Insecurity of 802.11\u201d. In Seventh Annual International Conference on Mobile Computing And Networking, Rome, Italy, July 2001.","DOI":"10.1145\/381677.381695"},{"key":"4_CR3","unstructured":"M. Mishra, W. Arbaugh, \u201cAn initial Security Analysis of the IEEE 802.1X Standard\u201d. Technical report, University of Maryland. February 2002."},{"key":"4_CR4","unstructured":"IEEE 8021X, \u201cPort-based Network Access Control. IEEE Std 802.1x\u201d. IEEE Standard, June 2001."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"L. Blunk, J. Vollbrecht, \u201cPPP Extensible Authentication Protocol (EAP)\u201d. RFC 2284, March 1998.","DOI":"10.17487\/rfc2284"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"J. Kohl, C. Neuman, \u201cThe Kerberos Network Authentication Service (V5)\u201d. RFC 1510, September 1993.","DOI":"10.17487\/rfc1510"},{"key":"4_CR7","unstructured":"IEEE, \u201cTGe Security Baseline Draft\u201d Draft IEEE 802.11e, March 2001."},{"key":"4_CR8","unstructured":"J. Trostle et al., \u201cInitial and Pass Through Authentication Using Kerberos V5 and the GSSAPI (IAKERB)\u201d. Internet draft, October 2002."},{"key":"4_CR9","unstructured":"A. Lakhiani, \u201cA transparent authentication protocol for Wireless Networks\u201d, Master thesis, University of OHIO, March 2003."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"D.B. Faria, D.R. Cheriton. \u201cDoS and Authentication in Wireless Public Access Networks\u201d. In Proceedings of the First ACM Workshop on Wireless Security, Atlanta, September 2002.","DOI":"10.1145\/570681.570687"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"M.A. Kaafar et al., \u201cA Kerberos-based authentication architecture for Wireless Lans\u201d. In proceedings of the Third IFIP-TC6 International Conference on Networking (Networking 2004), Athens, Greece, May 2004.","DOI":"10.1007\/978-3-540-24693-0_117"},{"key":"4_CR12","unstructured":"C. Neuman et al. \u201cThe Kerberos Network Authentication Service (V5)\u201d, Internet Draft draftietf-krb-wg-kerberos-clarifications-05.txt, June 2003."},{"key":"4_CR13","unstructured":"T. Wu, \u201cA Real-World Analysis of Kerberos Password Security\u201d. In proceedings of the sixth Annual Symposium on Network and Distributed System Security, San Diego, February 1999."},{"key":"4_CR14","unstructured":"B. Tung, et al., \u201cPublic Key Cryptography for initial authentication in Kerberos\u201d. Internet Draft draft-ietf-cat-kerberos-pk-init-18.txt, March 2001."},{"key":"4_CR15","unstructured":"N. Asokan et al., \u201cMan-in-the-middle in tunneled authentication protocols\u201d. Technical Report 2002\/163, IACR ePrint archive, October 2002."},{"key":"4_CR16","unstructured":"J. Puthenkulam et al., \u201cThe compound authentication binding problem\u201d. Internet draft draft-puthenkulam-eap-binding-01.txt, October 2002."}],"container-title":["IFIP International Federation for Information Processing","Network Control and Engineering for QoS, Security and Mobility, III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23198-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T04:38:03Z","timestamp":1619498283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23198-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387231978"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-23198-6_4","relation":{},"subject":[]}}