Crossed Crypto-Scheme in WPA PSK Mode

Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Balitanas, M.O., Robles, R.-J., Nayoun Kim, Taihoon Kim
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 106
container_issue
container_start_page 102
container_title
container_volume
creator Balitanas, M.O.
Robles, R.-J.
Nayoun Kim
Taihoon Kim
description Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).
doi_str_mv 10.1109/BLISS.2009.23
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5376822</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5376822</ieee_id><sourcerecordid>5376822</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b4a54f874196f46dc7d144d3f967ce20af62942131a4cfc15829469488786eb13</originalsourceid><addsrcrecordid>eNotj01LAzEURQNS0NYuXbnJxuWMecnL17IOWosjFkZxWdLkBUesUybd9N9b0dXlnMWBy9gViBpA-Nu7dtV1tRTC11KdsamwxmtlNeoJm_5qL1Aadc7mpXwKIcAaBOcu2E0zDqVQ4s143B-GqosftCPef_P39YKvuyf-PCS6ZJMcvgrN_3fG3h7uX5vHqn1ZrppFW_Vg9aHaYtCYnUXwJqNJ0SZATCp7YyNJEbKRHiUoCBhzBO1OaDw6Z52hLagZu_7r9kS02Y_9LozHzemIcVKqH8lcPLc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Crossed Crypto-Scheme in WPA PSK Mode</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</creator><creatorcontrib>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</creatorcontrib><description>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</description><identifier>ISBN: 0769537545</identifier><identifier>ISBN: 1424446333</identifier><identifier>ISBN: 9780769537542</identifier><identifier>ISBN: 9781424446339</identifier><identifier>DOI: 10.1109/BLISS.2009.23</identifier><identifier>LCCN: 2009904263</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Advanced Encryption Standard (AES) ; Communication system security ; cryptography ; Data security ; Elliptic curve cryptography ; Elliptic Curve Cryptography (ECC) ; Intelligent systems ; Internet ; Multimedia computing ; Multimedia systems ; Phase shift keying ; Protection ; wireless ; WPA</subject><ispartof>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009, p.102-106</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5376822$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5376822$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Balitanas, M.O.</creatorcontrib><creatorcontrib>Robles, R.-J.</creatorcontrib><creatorcontrib>Nayoun Kim</creatorcontrib><creatorcontrib>Taihoon Kim</creatorcontrib><title>Crossed Crypto-Scheme in WPA PSK Mode</title><title>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security</title><addtitle>BLISS</addtitle><description>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</description><subject>Access protocols</subject><subject>Advanced Encryption Standard (AES)</subject><subject>Communication system security</subject><subject>cryptography</subject><subject>Data security</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic Curve Cryptography (ECC)</subject><subject>Intelligent systems</subject><subject>Internet</subject><subject>Multimedia computing</subject><subject>Multimedia systems</subject><subject>Phase shift keying</subject><subject>Protection</subject><subject>wireless</subject><subject>WPA</subject><isbn>0769537545</isbn><isbn>1424446333</isbn><isbn>9780769537542</isbn><isbn>9781424446339</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LAzEURQNS0NYuXbnJxuWMecnL17IOWosjFkZxWdLkBUesUybd9N9b0dXlnMWBy9gViBpA-Nu7dtV1tRTC11KdsamwxmtlNeoJm_5qL1Aadc7mpXwKIcAaBOcu2E0zDqVQ4s143B-GqosftCPef_P39YKvuyf-PCS6ZJMcvgrN_3fG3h7uX5vHqn1ZrppFW_Vg9aHaYtCYnUXwJqNJ0SZATCp7YyNJEbKRHiUoCBhzBO1OaDw6Z52hLagZu_7r9kS02Y_9LozHzemIcVKqH8lcPLc</recordid><startdate>200908</startdate><enddate>200908</enddate><creator>Balitanas, M.O.</creator><creator>Robles, R.-J.</creator><creator>Nayoun Kim</creator><creator>Taihoon Kim</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200908</creationdate><title>Crossed Crypto-Scheme in WPA PSK Mode</title><author>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b4a54f874196f46dc7d144d3f967ce20af62942131a4cfc15829469488786eb13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access protocols</topic><topic>Advanced Encryption Standard (AES)</topic><topic>Communication system security</topic><topic>cryptography</topic><topic>Data security</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic Curve Cryptography (ECC)</topic><topic>Intelligent systems</topic><topic>Internet</topic><topic>Multimedia computing</topic><topic>Multimedia systems</topic><topic>Phase shift keying</topic><topic>Protection</topic><topic>wireless</topic><topic>WPA</topic><toplevel>online_resources</toplevel><creatorcontrib>Balitanas, M.O.</creatorcontrib><creatorcontrib>Robles, R.-J.</creatorcontrib><creatorcontrib>Nayoun Kim</creatorcontrib><creatorcontrib>Taihoon Kim</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Balitanas, M.O.</au><au>Robles, R.-J.</au><au>Nayoun Kim</au><au>Taihoon Kim</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Crossed Crypto-Scheme in WPA PSK Mode</atitle><btitle>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security</btitle><stitle>BLISS</stitle><date>2009-08</date><risdate>2009</risdate><spage>102</spage><epage>106</epage><pages>102-106</pages><isbn>0769537545</isbn><isbn>1424446333</isbn><isbn>9780769537542</isbn><isbn>9781424446339</isbn><abstract>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</abstract><pub>IEEE</pub><doi>10.1109/BLISS.2009.23</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769537545
ispartof 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009, p.102-106
issn
language eng
recordid cdi_ieee_primary_5376822
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access protocols
Advanced Encryption Standard (AES)
Communication system security
cryptography
Data security
Elliptic curve cryptography
Elliptic Curve Cryptography (ECC)
Intelligent systems
Internet
Multimedia computing
Multimedia systems
Phase shift keying
Protection
wireless
WPA
title Crossed Crypto-Scheme in WPA PSK Mode
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A20%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Crossed%20Crypto-Scheme%20in%20WPA%20PSK%20Mode&rft.btitle=2009%20Symposium%20on%20Bio-inspired%20Learning%20and%20Intelligent%20Systems%20for%20Security&rft.au=Balitanas,%20M.O.&rft.date=2009-08&rft.spage=102&rft.epage=106&rft.pages=102-106&rft.isbn=0769537545&rft.isbn_list=1424446333&rft.isbn_list=9780769537542&rft.isbn_list=9781424446339&rft_id=info:doi/10.1109/BLISS.2009.23&rft_dat=%3Cieee_6IE%3E5376822%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5376822&rfr_iscdi=true