A Survey of WPA and 802.11i RSN Authentication Protocols. Baek, K., Smith, S., W., & Kotz, D. Technical Report Dartmouth Computer Science, 11, 2004. Website abstract bibtex In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.
@techreport{
title = {A Survey of WPA and 802.11i RSN Authentication Protocols},
type = {techreport},
year = {2004},
keywords = {dartmouth-cs,network,security,wireless},
issue = {TR2004-524},
websites = {http://www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf},
month = {11},
city = {Hanover, NH},
institution = {Dartmouth Computer Science},
id = {1f35411e-07ac-3415-a011-c36c599b2a63},
created = {2018-07-12T21:31:25.252Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:25.252Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {baek:survey-tr},
source_type = {techreport},
private_publication = {false},
abstract = {In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.},
bibtype = {techreport},
author = {Baek, Kwang-Hyun and Smith, Sean W and Kotz, David}
}
Downloads: 0
{"_id":"eckByQgMzfuGHzohB","bibbaseid":"baek-smith-kotz-asurveyofwpaand80211irsnauthenticationprotocols-2004","downloads":0,"creationDate":"2019-02-15T15:14:59.022Z","title":"A Survey of WPA and 802.11i RSN Authentication Protocols","author_short":["Baek, K.","Smith, S., W.","Kotz, D."],"year":2004,"bibtype":"techreport","biburl":null,"bibdata":{"title":"A Survey of WPA and 802.11i RSN Authentication Protocols","type":"techreport","year":"2004","keywords":"dartmouth-cs,network,security,wireless","issue":"TR2004-524","websites":"http://www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf","month":"11","city":"Hanover, NH","institution":"Dartmouth Computer Science","id":"1f35411e-07ac-3415-a011-c36c599b2a63","created":"2018-07-12T21:31:25.252Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:25.252Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"baek:survey-tr","source_type":"techreport","private_publication":false,"abstract":"In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.","bibtype":"techreport","author":"Baek, Kwang-Hyun and Smith, Sean W and Kotz, David","bibtex":"@techreport{\n title = {A Survey of WPA and 802.11i RSN Authentication Protocols},\n type = {techreport},\n year = {2004},\n keywords = {dartmouth-cs,network,security,wireless},\n issue = {TR2004-524},\n websites = {http://www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf},\n month = {11},\n city = {Hanover, NH},\n institution = {Dartmouth Computer Science},\n id = {1f35411e-07ac-3415-a011-c36c599b2a63},\n created = {2018-07-12T21:31:25.252Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:25.252Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {baek:survey-tr},\n source_type = {techreport},\n private_publication = {false},\n abstract = {In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.},\n bibtype = {techreport},\n author = {Baek, Kwang-Hyun and Smith, Sean W and Kotz, David}\n}","author_short":["Baek, K.","Smith, S., W.","Kotz, D."],"urls":{"Website":"http://www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf"},"bibbaseid":"baek-smith-kotz-asurveyofwpaand80211irsnauthenticationprotocols-2004","role":"author","keyword":["dartmouth-cs","network","security","wireless"],"downloads":0},"search_terms":["survey","wpa","802","11i","rsn","authentication","protocols","baek","smith","kotz"],"keywords":["dartmouth-cs","network","security","wireless"],"authorIDs":["5c66d9b9e4b1db10000001ba","5c69efe6ac591010000000e0"]}