{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T01:59:50Z","timestamp":1776995990744,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,25]],"date-time":"2018-02-25T00:00:00Z","timestamp":1519516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,25]]},"DOI":"10.1145\/3193025.3193047","type":"proceedings-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T17:51:36Z","timestamp":1526579496000},"page":"125-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs"],"prefix":"10.1145","author":[{"given":"Biswanath","family":"Dey","sequence":"first","affiliation":[{"name":"National Institute of Technology Silchar, Silchar, Assam, India"}]},{"given":"S. S.","family":"Vishnu","sequence":"additional","affiliation":[{"name":"National Institute of Technology Silchar, Silchar, Assam, India"}]},{"given":"Om Satyam","family":"Swarnkar","sequence":"additional","affiliation":[{"name":"National Institute of Technology Silchar, Silchar, Assam, India"}]}],"member":"320","published-online":{"date-parts":[[2018,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"INSTICC Press","author":"Bard G. V.","year":"2006","unstructured":"G. V. Bard , \"A challenging but feasible blockwise adaptive chosen-plaintext attack on SSL,\" IEEE International Conference on Security and Cryptography , INSTICC Press , 2006 . G. V. Bard, \"A challenging but feasible blockwise adaptive chosen-plaintext attack on SSL,\" IEEE International Conference on Security and Cryptography, INSTICC Press, 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2009.32"},{"key":"e_1_3_2_1_3_1","unstructured":"IEEE Standard for local and metropolitan area networks \"Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications\" ANSI\/IEEE Std 802.11 1999 Edition (R2003).  IEEE Standard for local and metropolitan area networks \"Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications\" ANSI\/IEEE Std 802.11 1999 Edition (R2003)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862322"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B. Aboba L. Blunk J. Vollbrecht J. Carlson \"Extensible Authentication Protocol (EAP)\" RFC 3748 June 2004.  B. Aboba L. Blunk J. Vollbrecht J. Carlson \"Extensible Authentication Protocol (EAP)\" RFC 3748 June 2004.","DOI":"10.17487\/rfc3748"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S. Frankel R. Glenn S. Kelly \"The AES-CBC Cipher Algorithm and Its Use with IPsec\" RFC 3602 September 2003   S. Frankel R. Glenn S. Kelly \"The AES-CBC Cipher Algorithm and Its Use with IPsec\" RFC 3602 September 2003","DOI":"10.17487\/rfc3602"},{"key":"e_1_3_2_1_7_1","volume-title":"The EAP-TLS Authentication Protocol,\" RFC","author":"Adoba B.","year":"2008","unstructured":"B. Adoba , D. Simon , and R. Hurst , \" The EAP-TLS Authentication Protocol,\" RFC 5216, Mar. 2008 . B. Adoba, D. Simon, and R. Hurst, \"The EAP-TLS Authentication Protocol,\" RFC 5216, Mar. 2008."},{"key":"e_1_3_2_1_8_1","first-page":"2765","article-title":"A New Secure Session Exchange Key Protocol for Wireless Communications","author":"Badra M.","year":"2003","unstructured":"M. Badra and A. Serhrouchni , \" A New Secure Session Exchange Key Protocol for Wireless Communications ,\" Proc. IEEE 14th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC) , pp. 2765 -- 2769 , 2003 . M. Badra and A. Serhrouchni, \"A New Secure Session Exchange Key Protocol for Wireless Communications,\" Proc. IEEE 14th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC), pp. 2765--2769, 2003.","journal-title":"Proc. IEEE 14th Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC)"},{"key":"e_1_3_2_1_9_1","first-page":"22","article-title":"Entity Authentication and Key Distribution","author":"Bellare M.","year":"1993","unstructured":"M. Bellare and P. Rogaway , \" Entity Authentication and Key Distribution ,\" Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology , pp. 22 -- 26 , 1993 . M. Bellare and P. Rogaway, \"Entity Authentication and Key Distribution,\" Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 22--26, 1993.","journal-title":"Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology"},{"key":"e_1_3_2_1_10_1","volume-title":"EAP SRP-SHA1 Authentication Protocol","author":"Carlson J.","year":"2001","unstructured":"J. Carlson , B. Aboba , and H. Haverinen , \" EAP SRP-SHA1 Authentication Protocol ,\" July 2001 . J. Carlson, B. Aboba, and H. Haverinen, \"EAP SRP-SHA1 Authentication Protocol,\" July 2001."},{"key":"e_1_3_2_1_11_1","volume-title":"The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST),\" RFC","author":"Cam-Winget N.","year":"2007","unstructured":"N. Cam-Winget , D. McGrew , J. Salowey , and H. Zhou , \" The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST),\" RFC 4851, May 2007 . N. Cam-Winget, D. McGrew, J. Salowey, and H. Zhou, \"The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST),\" RFC 4851, May 2007."},{"key":"e_1_3_2_1_12_1","volume-title":"RFC 2026","author":"Palekar Ashwin","year":"2003","unstructured":"Ashwin Palekar , Dan Simon , Glen Zorn , S. Josefsson , \" Protected EAP Protocol (PEAP)\" , RFC 2026 , March 2003 Ashwin Palekar, Dan Simon, Glen Zorn, S. Josefsson, \"Protected EAP Protocol (PEAP)\", RFC 2026, March 2003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1561920"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3580"},{"key":"e_1_3_2_1_15_1","volume-title":"Networking (ICN '04)","author":"Dandjinou M.T.","year":"2004","unstructured":"M.T. Dandjinou and P. Urien , \" EAP-SSC Protocol,\" Proc. Third Int'l Conf . Networking (ICN '04) , 2004 . M.T. Dandjinou and P. Urien, \"EAP-SSC Protocol,\" Proc. Third Int'l Conf. Networking (ICN '04), 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"J. Arkko H. Haverinen \"Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAPAKA)\" RFC 4187 January 2006  J. Arkko H. Haverinen \"Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAPAKA)\" RFC 4187 January 2006","DOI":"10.17487\/rfc4187"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2246"},{"key":"e_1_3_2_1_18_1","volume-title":"The TLS Protocol Version 1.2,\" RFC","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla , \" The TLS Protocol Version 1.2,\" RFC 5246, Aug. 2008 . T. Dierks and E. Rescorla, \"The TLS Protocol Version 1.2,\" RFC 5246, Aug. 2008."},{"key":"e_1_3_2_1_19_1","volume-title":"Pre-Shared Key Ciphersuites for Transport Layer Security (TLS),\" RFC","author":"Eronen P.","year":"2005","unstructured":"P. Eronen and H. Tschofenig , \" Pre-Shared Key Ciphersuites for Transport Layer Security (TLS),\" RFC 4279, Dec. 2005 . P. Eronen and H. Tschofenig, \"Pre-Shared Key Ciphersuites for Transport Layer Security (TLS),\" RFC 4279, Dec. 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Feb.","author":"Funk P.","year":"2005","unstructured":"P. Funk and B.W. Simon , \" EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0),\" IETF Draft, draft-funk-eapttlsv0-00.txt , Feb. 2005 . P. Funk and B.W. Simon, \"EAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0),\" IETF Draft, draft-funk-eapttlsv0-00.txt, Feb. 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"RFC 2026","author":"Funk Paul","year":"2003","unstructured":"Paul Funk , \" The EAP MD5- Tunneled Authentication Protocol (EAP-MD5-Tunneled)\" , RFC 2026 , March 2003 Paul Funk, \"The EAP MD5-Tunneled Authentication Protocol (EAP-MD5-Tunneled)\", RFC 2026, March 2003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769822"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS.2008.10"},{"key":"e_1_3_2_1_24_1","volume-title":"Oct.","author":"Jablon D.","year":"2003","unstructured":"D. Jablon , \" The SPEKE Password-Based Key Agreement Methods ,\" IETF Draft , draft-jablon-speke-02.txt , Oct. 2003 . D. Jablon, \"The SPEKE Password-Based Key Agreement Methods,\" IETF Draft, draft-jablon-speke-02.txt, Oct. 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.03.002"},{"key":"e_1_3_2_1_26_1","first-page":"5","article-title":"Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs","volume":"87","author":"Park Y.M.","year":"2004","unstructured":"Y.M. Park and S.K. Park , \" Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs ,\" IEICE Trans. Comm. , vol. E87 -B, no. 5 , pp. 1382--1385, 2004 . Y.M. Park and S.K. Park, \"Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs,\" IEICE Trans. Comm., vol. E87-B, no. 5, pp. 1382--1385, 2004.","journal-title":"IEICE Trans. Comm."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla \"Diffie-Hellman Key Agreement Method \" RFC 2631 June 1999.   E. Rescorla \"Diffie-Hellman Key Agreement Method \" RFC 2631 June 1999.","DOI":"10.17487\/rfc2631"},{"key":"e_1_3_2_1_28_1","volume-title":"RFC 1994","author":"Simpson W.","year":"1996","unstructured":"W. Simpson , \" PPP Challenge Handshake Authentication Protocol (CHAP),\" RFC 1994 , Aug. 1996 . W. Simpson, \"PPP Challenge Handshake Authentication Protocol (CHAP),\" RFC 1994, Aug. 1996."},{"key":"e_1_3_2_1_29_1","volume-title":"Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs,\" RFC","author":"Stanley D.","year":"2005","unstructured":"D. Stanley , J. Walker , and B. Aboba , \" Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs,\" RFC 4017, Mar. 2005 . D. Stanley, J. Walker, and B. Aboba, \"Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs,\" RFC 4017, Mar. 2005."},{"key":"e_1_3_2_1_30_1","volume-title":"8th International Conference on Wireless Communications, Networking and Mobile Computing","author":"Wang Chang-Quan","year":"2012","unstructured":"Chang-Quan Wang , \" Research on WLAN Security Authentication Technology based on EAP-SAKE \", 8th International Conference on Wireless Communications, Networking and Mobile Computing , September 2012 Chang-Quan Wang, \"Research on WLAN Security Authentication Technology based on EAP-SAKE\", 8th International Conference on Wireless Communications, Networking and Mobile Computing, September 2012"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.164"},{"issue":"3","key":"e_1_3_2_1_32_1","first-page":"5052","article-title":"Authentication and Key Negotiation Protocol Based on EAP-SAKE in WLAN","volume":"26","author":"Wang B.","year":"2011","unstructured":"B. Wang , X.M. Lv , \" Authentication and Key Negotiation Protocol Based on EAP-SAKE in WLAN ,\" Journal of Zhengzhou University of Light Industry (Natural Science) , vol. 26 , no. 3 , pp. 5052 , June 2011 B. Wang, X.M. Lv, \"Authentication and Key Negotiation Protocol Based on EAP-SAKE in WLAN,\" Journal of Zhengzhou University of Light Industry (Natural Science), vol.26, no.3, pp.5052, June 2011","journal-title":"Journal of Zhengzhou University of Light Industry (Natural Science)"}],"event":{"name":"ICDSP 2018: 2018 2nd International Conference on Digital Signal Processing","location":"Tokyo Japan","acronym":"ICDSP 2018"},"container-title":["Proceedings of the 2nd International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193025.3193047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:09Z","timestamp":1750213569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193025.3193047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,25]]},"references-count":32,"alternative-id":["10.1145\/3193025.3193047","10.1145\/3193025"],"URL":"https:\/\/doi.org\/10.1145\/3193025.3193047","relation":{},"subject":[],"published":{"date-parts":[[2018,2,25]]},"assertion":[{"value":"2018-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}