14691 results found. results are sorted by relevance
  76-100
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01489r2P802-15_TG3-Security-for-the-802-15-3-Wireless-Personal-Area-Network.doc
e) Supported algorithms Discussion Security Policy Key Updates 1 Security model The implementation of the security policy depends on the trust relationships between entities in the piconet. 1.1 Role Model One can distinguish the following roles of entities within the piconet setting: · Security Manager .
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02217r0P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jul02/02217r2P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jul02/02217r1P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/01489r4P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area%20-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Mar02/02122r0P802-15_TG3-Schaumburg-Security-Minutes.doc
Worked on the Security Goals document that given as the work goals for the Security subgroup.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01489r0P802-15_TG3-Security-for-the-802-15-3-Wireless-Personal-Area-Network.doc
Security Constraints Imposed by the 802.15.3 WPAN The 802.15.3 WPAN imposes the following security constraints: · Untrusted devices.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/02026r2P802-15_TG3-Security-Minutes-Austin-to-Dallas.doc
Will it offer usable security?
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02228r0P802-15_TG3-RSA-Security-Suite-Proposal.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jul02/02228r1P802-15_TG3-RSA-Security-Suite-Proposal.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02399r4P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02399r0P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02399r3P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02135r1P803-15_TG3-MAC-Distributed-Security-Proposal.pdf
Note: Representation of the group element can have important security implications.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02399r2P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02399r1P802-15_TG3-LB19-security-comment-resolutions.pdf
On line 30 change "and security manager" to "and security manager of the piconet ".
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02200r2P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Security Suite Specifications This clause specifies the security suites that may be used when security is turned on in the piconet.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02200r3P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.doc
10.3 ECMQV security suite Editorial note: Replace the ECIES 256-prime-1 security suite, as specified in Clause 10.3 of the current Draft D10 by the ECMQV security suite specified below.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/02026r0P802-15_TG3-Security-Minutes-Austin-to-Dallas.doc
Will it offer usable security?
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02200r1P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Purpose This document defines the security elements necessary to implement the mandatory and optional elliptic curve cryptography (ECC) security suite.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01477r0P802-15_TG3-Security-Rationale-for-802-15-3.doc
Security Needs 4.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01489r2P802-15_TG3-Security-for-the-802-15-3-Wireless-Personal-Area-Network.doc
e) Supported algorithms Discussion Security Policy Key Updates 1 Security model The implementation of the security policy depends on the trust relationships between entities in the piconet. 1.1 Role Model One can distinguish the following roles of entities within the piconet setting: · Security Manager .
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r5P802-15_TG3-D10-security-related-comment-resolutions.pdf
Add a new element called the "secure frame counter." to every secure frame.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r6P802-15_TG3-D10-security-related-comment-resolutions.pdf
Add a secure frame counter, 2 octets, to all secure frames at the beginning of the frame, right after the time token.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r4P802-15_TG3-D10-security-related-comment-resolutions.pdf
Secure frame counter (SFC) field The secure frame counter field shall be included in the frame body of all secure frames.