14691 results found. results are sorted by relevance
1-25
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02364r0P802-15_TG3-Security-and-Security-Architectural-Recommendations-for-the-IEEE-802.15.3-High-Rate-WPAN.doc
Throughout the draft, use only mode 0 or mode 1 or security off or security on.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02364r1P802-15_TG3-Security-and-Security-Architectural-Recommendations-for%20-the-IEEE-802.15.3-High-Rate-WPAN.doc
Note RS: the SHA1-hash has no security functionality.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02364r2P802-15_TG3-Security-and-Security-Architectural-Recommendations-for%20-the-IEEE-802.15.3-High-Rate-WPAN.doc
Note RS: the SHA1-hash has no security functional
https://grouper.ieee.org/groups/802/15/pub/2002/Jul02/02302r0P802-15_TG4-Security-and-Security-Architectural-Recommendations-for-the-IEEE-802.15.4-Low-Rate-WPAN.doc
Obviously, if no security services are provided, Steps 2 and 3 above may be omitted. 7.7.2.1 Applicable security services The applicable security services are indicated as specified by the Security Services Identifier in the frame control field (see Section 7.2.1.1.6).
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Sep02/02364r0P802-15_TG3-Security-and-Security-Architectural-Recommendations-for-the-IEEE-802.15.3-High-Rate-WPAN.doc
Throughout the draft, use only mode 0 or mode 1 or security off or security on.
https://grouper.ieee.org/groups/802/802_tutorials/05-July/Secure%20Device%20ID_Broadsafe.pdf
Authenticating the manufacturer of the module.Communication Path (non-secure) Authenticator generates a challenge (unique random 160 bit number).
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02364r1P802-15_TG3-Security-and-Security-Architectural-Recommendations-for%20-the-IEEE-802.15.3-High-Rate-WPAN.doc
Note RS: the SHA1-hash has no security functionality.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02364r2P802-15_TG3-Security-and-Security-Architectural-Recommendations-for%20-the-IEEE-802.15.3-High-Rate-WPAN.doc
Note RS: the SHA1-hash has no security functional
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jul02/02302r0P802-15_TG4-Security-and-Security-Architectural-Recommendations-for-the-IEEE-802.15.4-Low-Rate-WPAN.doc
Obviously, if no security services are provided, Steps 2 and 3 above may be omitted. 7.7.2.1 Applicable security services The applicable security services are indicated as specified by the Security Services Identifier in the frame control field (see Section 7.2.1.1.6).
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/02038r0P802-15_TG3-Security-Suite-Framework.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Mar02/02113r0P802-15_TG3-MAC-Distributed-Security-Proposal.doc
Without this, no cryptographic security can be provided. 10.2.2 Actual security services The security services that are to be provided include the following: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02481r1P802-15_TG4-Proposed-security-text.doc
Change: 7.6.1.8 PIB security material This subclauses describes the formats of the security information stored in the MAC PIB.
https://grouper.ieee.org/groups/802/15/pub/2002/Nov02/02481r0P802-15_TG4-Proposed-security-text.doc
Change: 7.6.1.8 PIB security material This subclauses describes the formats of the security information stored in the MAC PIB.
https://grouper.ieee.org/groups/802/20/DropBox/Security%20AdHoc%20Notes%20-%2007-13-04-Final-changes%20accepted.doc
Security Ad hoc group: · To give quick feedback on the security section of the requirements document (how this feedback is used is up to .20).
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02213r0P802-15_TG3-Analysis-of-ECC-Security-Proposals.doc
Executive Summary We compare the security of both ECC security proposals that are currently under consideration in Letter Ballot #16 of the IEEE 802.15.3 WPAN Task Group.
https://grouper.ieee.org/groups/802/15/pub/04/15-04-0416-00-004b-mac-security-clarification.doc
If the security enabled subfield is set to 1 in the frame control field, the frame payload is protected as defined by the security suite selected for that relationship.
https://grouper.ieee.org/groups/802/15/pub/2002/Mar02/02074r0P802-15_TG3-Security-CFP.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/01530r4P802-15_TG3-MAC-Security-Issues.doc
SecuritySessionID: Integer, 6 bytes, Specifies a unique random ID chosen by the security manager to indicate the current secure session.
https://grouper.ieee.org/groups/802/15/pub/2002/Mar02/02074r1P802-15_TG3-Security-CFP.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/01530r5P802-15_TG3-MAC-Security-Issues.doc
Effect: The security manager
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01530r1P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01530r0P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02362r0P802-15_TG3-NTRUEncrypt-Security-Suite.pdf
Security Suite Specifications 1.1 Security suite selections Author’s note: The OIDs and security services provided by the proposed NTRUEncrypt security suite are the same as the ones currently in the draft, so there should be no change to the text in 10.2.1 or 10.2.2 for this security suite Author’s note: The following sub-clause should replace clause 10.4 as the full text for the NTRUEncrypt 251-1 security suite. 1.2 NTRUEncrypt 251-1 The following subclauses define the security operations that are performed for the security suite NTRUEn- crypt 251-1.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01530r3P802-15_TG3-MAC-Security-Issues.doc
Security Parms are TBD.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/02038r0P802-15_TG3-Security-Suite-Framework.doc
In addition to the security goals, a security solution shall also have the following properties: 1.