Crossed Crypto-Scheme in WPA PSK Mode
Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern t...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 106 |
---|---|
container_issue | |
container_start_page | 102 |
container_title | |
container_volume | |
creator | Balitanas, M.O. Robles, R.-J. Nayoun Kim Taihoon Kim |
description | Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC). |
doi_str_mv | 10.1109/BLISS.2009.23 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5376822</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5376822</ieee_id><sourcerecordid>5376822</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-b4a54f874196f46dc7d144d3f967ce20af62942131a4cfc15829469488786eb13</originalsourceid><addsrcrecordid>eNotj01LAzEURQNS0NYuXbnJxuWMecnL17IOWosjFkZxWdLkBUesUybd9N9b0dXlnMWBy9gViBpA-Nu7dtV1tRTC11KdsamwxmtlNeoJm_5qL1Aadc7mpXwKIcAaBOcu2E0zDqVQ4s143B-GqosftCPef_P39YKvuyf-PCS6ZJMcvgrN_3fG3h7uX5vHqn1ZrppFW_Vg9aHaYtCYnUXwJqNJ0SZATCp7YyNJEbKRHiUoCBhzBO1OaDw6Z52hLagZu_7r9kS02Y_9LozHzemIcVKqH8lcPLc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Crossed Crypto-Scheme in WPA PSK Mode</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</creator><creatorcontrib>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</creatorcontrib><description>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</description><identifier>ISBN: 0769537545</identifier><identifier>ISBN: 1424446333</identifier><identifier>ISBN: 9780769537542</identifier><identifier>ISBN: 9781424446339</identifier><identifier>DOI: 10.1109/BLISS.2009.23</identifier><identifier>LCCN: 2009904263</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Advanced Encryption Standard (AES) ; Communication system security ; cryptography ; Data security ; Elliptic curve cryptography ; Elliptic Curve Cryptography (ECC) ; Intelligent systems ; Internet ; Multimedia computing ; Multimedia systems ; Phase shift keying ; Protection ; wireless ; WPA</subject><ispartof>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009, p.102-106</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5376822$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5376822$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Balitanas, M.O.</creatorcontrib><creatorcontrib>Robles, R.-J.</creatorcontrib><creatorcontrib>Nayoun Kim</creatorcontrib><creatorcontrib>Taihoon Kim</creatorcontrib><title>Crossed Crypto-Scheme in WPA PSK Mode</title><title>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security</title><addtitle>BLISS</addtitle><description>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</description><subject>Access protocols</subject><subject>Advanced Encryption Standard (AES)</subject><subject>Communication system security</subject><subject>cryptography</subject><subject>Data security</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic Curve Cryptography (ECC)</subject><subject>Intelligent systems</subject><subject>Internet</subject><subject>Multimedia computing</subject><subject>Multimedia systems</subject><subject>Phase shift keying</subject><subject>Protection</subject><subject>wireless</subject><subject>WPA</subject><isbn>0769537545</isbn><isbn>1424446333</isbn><isbn>9780769537542</isbn><isbn>9781424446339</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LAzEURQNS0NYuXbnJxuWMecnL17IOWosjFkZxWdLkBUesUybd9N9b0dXlnMWBy9gViBpA-Nu7dtV1tRTC11KdsamwxmtlNeoJm_5qL1Aadc7mpXwKIcAaBOcu2E0zDqVQ4s143B-GqosftCPef_P39YKvuyf-PCS6ZJMcvgrN_3fG3h7uX5vHqn1ZrppFW_Vg9aHaYtCYnUXwJqNJ0SZATCp7YyNJEbKRHiUoCBhzBO1OaDw6Z52hLagZu_7r9kS02Y_9LozHzemIcVKqH8lcPLc</recordid><startdate>200908</startdate><enddate>200908</enddate><creator>Balitanas, M.O.</creator><creator>Robles, R.-J.</creator><creator>Nayoun Kim</creator><creator>Taihoon Kim</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200908</creationdate><title>Crossed Crypto-Scheme in WPA PSK Mode</title><author>Balitanas, M.O. ; Robles, R.-J. ; Nayoun Kim ; Taihoon Kim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-b4a54f874196f46dc7d144d3f967ce20af62942131a4cfc15829469488786eb13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access protocols</topic><topic>Advanced Encryption Standard (AES)</topic><topic>Communication system security</topic><topic>cryptography</topic><topic>Data security</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic Curve Cryptography (ECC)</topic><topic>Intelligent systems</topic><topic>Internet</topic><topic>Multimedia computing</topic><topic>Multimedia systems</topic><topic>Phase shift keying</topic><topic>Protection</topic><topic>wireless</topic><topic>WPA</topic><toplevel>online_resources</toplevel><creatorcontrib>Balitanas, M.O.</creatorcontrib><creatorcontrib>Robles, R.-J.</creatorcontrib><creatorcontrib>Nayoun Kim</creatorcontrib><creatorcontrib>Taihoon Kim</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Balitanas, M.O.</au><au>Robles, R.-J.</au><au>Nayoun Kim</au><au>Taihoon Kim</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Crossed Crypto-Scheme in WPA PSK Mode</atitle><btitle>2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security</btitle><stitle>BLISS</stitle><date>2009-08</date><risdate>2009</risdate><spage>102</spage><epage>106</epage><pages>102-106</pages><isbn>0769537545</isbn><isbn>1424446333</isbn><isbn>9780769537542</isbn><isbn>9781424446339</isbn><abstract>Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).</abstract><pub>IEEE</pub><doi>10.1109/BLISS.2009.23</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769537545 |
ispartof | 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, 2009, p.102-106 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5376822 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access protocols Advanced Encryption Standard (AES) Communication system security cryptography Data security Elliptic curve cryptography Elliptic Curve Cryptography (ECC) Intelligent systems Internet Multimedia computing Multimedia systems Phase shift keying Protection wireless WPA |
title | Crossed Crypto-Scheme in WPA PSK Mode |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A20%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Crossed%20Crypto-Scheme%20in%20WPA%20PSK%20Mode&rft.btitle=2009%20Symposium%20on%20Bio-inspired%20Learning%20and%20Intelligent%20Systems%20for%20Security&rft.au=Balitanas,%20M.O.&rft.date=2009-08&rft.spage=102&rft.epage=106&rft.pages=102-106&rft.isbn=0769537545&rft.isbn_list=1424446333&rft.isbn_list=9780769537542&rft.isbn_list=9781424446339&rft_id=info:doi/10.1109/BLISS.2009.23&rft_dat=%3Cieee_6IE%3E5376822%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5376822&rfr_iscdi=true |