14691 results found. results are sorted by relevance
  51-75
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Mar02/02074r0P802-15_TG3-Security-CFP.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/01530r4P802-15_TG3-MAC-Security-Issues.doc
SecuritySessionID: Integer, 6 bytes, Specifies a unique random ID chosen by the security manager to indicate the current secure session.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Mar02/02074r1P802-15_TG3-Security-CFP.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r0P802-15_TG3-D10-security-related-comment-resolutions.pdf
Delete Secure Imm-ACK frame.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/01530r5P802-15_TG3-MAC-Security-Issues.doc
Effect: The security manager
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r1P802-15_TG3-D10-security-related-comment-resolutions.pdf
The SECID for a given key is selected by the security manager in the secure relationship as described in {xref - see reso- lution to 224 and 846}.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01530r0P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01530r1P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/02026r2P802-15_TG3-Security-Minutes-Austin-to-Dallas.doc
Will it offer usable security?
https://grouper.ieee.org/groups/802/15/pub/2002/Jul02/02228r1P802-15_TG3-RSA-Security-Suite-Proposal.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02228r0P802-15_TG3-RSA-Security-Suite-Proposal.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02362r0P802-15_TG3-NTRUEncrypt-Security-Suite.pdf
Security Suite Specifications 1.1 Security suite selections Author’s note: The OIDs and security services provided by the proposed NTRUEncrypt security suite are the same as the ones currently in the draft, so there should be no change to the text in 10.2.1 or 10.2.2 for this security suite Author’s note: The following sub-clause should replace clause 10.4 as the full text for the NTRUEncrypt 251-1 security suite. 1.2 NTRUEncrypt 251-1 The following subclauses define the security operations that are performed for the security suite NTRUEn- crypt 251-1.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02399r4P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01530r3P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02399r0P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02399r3P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01530r2P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02399r2P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02399r1P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02173r0P802-15_TG3-Security-Text-Recommendations-Rationale.doc
Bailey, Ari Singer, William Whyte] [NTRU] [5 Burlington Woods Burlington, MA 01803 USA] Voice: [+1 781 418-2522] Fax: [+1 781 418-2532] E-mail: [dbailey@ntru.com] Re: 802.15.3 TG3 Letter Ballot Draft D09, 02074r1P802.15_TG3-Security-CFP.doc, 02130r1P802-15_TG3-NTRU-Security-Architecture-Proposal.doc Abstract [This document offers the rationale for the recommended text for the ECC security algorithm suite for the 802.15.3 draft standard defined in 02171r0P802-15_TG3-Security-Text-Recommendations.doc The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02173r1P802-15_TG3-Security-Text-Recommendations-Rationale.doc
The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02173r2P802-15_TG3-Security-Text-Recommendations-Rationale.doc
The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02363r0P802-15_TG3-RSA-Security-Suite.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/02026r0P802-15_TG3-Security-Minutes-Austin-to-Dallas.doc
Will it offer usable security?
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01432r0P802-15_TG3-MAC-Security-Proposal.doc
IF security is FALSE, THEN Promiscuously admit all DEVs based on security being off.