14691 results found. results are sorted by relevance
  101-125
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r7P802-15_TG3-D10-security-related-comment-resolutions.pdf
, SECID - security identi- fier.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02210r0P802-15_TG3-NTRU-Full-Security-Text-Proposal.pdf
Security Wireless networks face unique security challenges and WPANs are no exception.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Mar02/02122r0P802-15_TG3-Schaumburg-Security-Minutes.doc
Worked on the Security Goals document that given as the work goals for the Security subgroup.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r3P802-15_TG3-D10-security-related-comment-resolutions.pdf
If two DEVs in a secure piconet do not have a peer-to-peer security relationship, they may use the piconet group data key for secure commands and secure data frames transmitted between them.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r2P802-15_TG3-D10-security-related-comment-resolutions.pdf
Secure frame counter (SFC) field The secure frame counter field contains a 2-octet counter that is used to ensure the uniqueness of the nonce in a secure frame.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01489r3P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/01489r3P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/01489r4P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area%20-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01489r4P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02200r0P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Purpose This document defines the security elements necessary to implement the mandatory elliptic curve cryptography (ECC) security suite.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r0P802-15_TG3-D10-security-related-comment-resolutions.pdf
Delete Secure Imm-ACK frame.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2001/Nov01/01489r0P802-15_TG3-Security-for-the-802-15-3-Wireless-Personal-Area-Network.doc
Security Constraints Imposed by the 802.15.3 WPAN The 802.15.3 WPAN imposes the following security constraints: · Untrusted devices.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02334r1P802-15_TG3-D10-security-related-comment-resolutions.pdf
The SECID for a given key is selected by the security manager in the secure relationship as described in {xref - see reso- lution to 224 and 846}.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02135r1P803-15_TG3-MAC-Distributed-Security-Proposal.pdf
Note: Representation of the group element can have important security implications.
https://grouper.ieee.org/groups/802/21/doctree/2004_Meeting_Docs/2004-05_meeting_docs/21-04-0063-00-0000-cheng_requirements.doc
Security Security It shall not compromise security of a network for a terminal handover from a network of lower security level Security schemes in individual access technology should be reused (decided by the PAR) Security solutions in individual technology shall be reused.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02200r2P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Security Suite Specifications This clause specifies the security suites that may be used when security is turned on in the piconet.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02200r1P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Purpose This document defines the security elements necessary to implement the mandatory and optional elliptic curve cryptography (ECC) security suite.
https://grouper.ieee.org/groups/802/21/email21/msg02466.html
Best Regards, Yoshihiro Ohba Follow-Ups : Re: [802.21] Security SG: Scope issues (MIH-level Security) From: Lily Chen Re: [802.21] Security SG: Scope issues (MIH-level Security) From: Clint Chaplin Prev by Date: Re: [802.21] Security SG: Scope issues (MIH-level Security) Next by Date: RE: [802.21] Security SG: Scope issues Previous by thread: Updated Draft D8.0 Next by thread: Re: [802.21] Security SG: Scope issues (MIH-level Security) Index(es): Date Thread
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02200r0P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.pdf
Purpose This document defines the security elements necessary to implement the mandatory elliptic curve cryptography (ECC) security suite.
https://grouper.ieee.org/groups/802/21/email21/msg02091.html
For security it defines the User Security Model (USM), based around a username ID.
https://grouper.ieee.org/groups/802/21/email21/msg02628.html
Security SG: MIH-level security volunteers Thread Links Date Links Thread Prev Thread Next Thread Index Date Prev Date Next Date Index Security SG: MIH-level security volunteers To : stds-802-21@LISTSERV.IEEE.ORG Subject : Security SG: MIH-level security volunteers From : Yoshihiro Ohba < yohba@tari.toshiba.com > Date : Mon, 24 Mar 2008 11:13:20 -0400 List-Help : < http://listserv.ieee.org/cgi-bin/wa?
https://grouper.ieee.org/groups/802/15/pub/2003/Jan03/03046r1P802-15_TG3-Draft-D15-Annex%20B-Security-Implementation-AES-CCM.pdf
Using the same nonce for two different messages encrypted with the same key destroys the security properties of this mode. — The message m, consisting of a string of l(m) octets where 0 ≤ l(m) < 28L.
https://grouper.ieee.org/groups/802/15/pub/2003/Jan03/03046r0P802-15_TG3-Draft-D15-Annex%20B-Security-Implementation-AES-CCM.pdf
Using the same nonce for two different messages encrypted with the same key destroys the security properties of this mode. — The message m, consisting of a string of l(m) octets where 0 ≤ l(m) < 28L.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02468r0P802-15_TG4-Draft-D17-Clause%207.6-Security-Recommendation-for-IEEE-802.15.4-Low-Rate-WPAN.pdf
If the TxOptions parameter specifies that security is required for this frame, the MAC sublayer shall set the security
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02468r0P802-15_TG4-Draft-D17-Clause%207.6-Security-Recommendation-for-IEEE-802.15.4-Low-Rate-WPAN.pdf
If the TxOptions parameter specifies that security is required for this frame, the MAC sublayer shall set the security