14704 results found. results are sorted by relevance
  26-50
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Jan02/02038r0P802-15_TG3-Security-Suite-Framework.doc
In addition to the security goals, a security solution shall also have the following properties: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02200r3P802-15_TG3-Mandatory-ECC-Security-Algorithm-Suite.doc
10.3 ECMQV security suite Editorial note: Replace the ECIES 256-prime-1 security suite, as specified in Clause 10.3 of the current Draft D10 by the ECMQV security suite specified below.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Mar02/02113r0P802-15_TG3-MAC-Distributed-Security-Proposal.doc
Without this, no cryptographic security can be provided. 10.2.2 Actual security services The security services that are to be provided include the following: 1.
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02173r0P802-15_TG3-Security-Text-Recommendations-Rationale.doc
Bailey, Ari Singer, William Whyte] [NTRU] [5 Burlington Woods Burlington, MA 01803 USA] Voice: [+1 781 418-2522] Fax: [+1 781 418-2532] E-mail: [dbailey@ntru.com] Re: 802.15.3 TG3 Letter Ballot Draft D09, 02074r1P802.15_TG3-Security-CFP.doc, 02130r1P802-15_TG3-NTRU-Security-Architecture-Proposal.doc Abstract [This document offers the rationale for the recommended text for the ECC security algorithm suite for the 802.15.3 draft standard defined in 02171r0P802-15_TG3-Security-Text-Recommendations.doc The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02173r1P802-15_TG3-Security-Text-Recommendations-Rationale.doc
The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02173r2P802-15_TG3-Security-Text-Recommendations-Rationale.doc
The ECC suite performance and security is analyzed.]
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02363r0P802-15_TG3-RSA-Security-Suite.pdf
Security Suite Specifications 1.1 Security suite selections 1.1.1 OID selections Author’s note: The following entry should be added to the security suites table in clause 10.2.1.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02481r0P802-15_TG4-Proposed-security-text.doc
Change: 7.6.1.8 PIB security material This subclauses describes the formats of the security information stored in the MAC PIB.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/Nov02/02481r1P802-15_TG4-Proposed-security-text.doc
Change: 7.6.1.8 PIB security material This subclauses describes the formats of the security information stored in the MAC PIB.
https://grouper.ieee.org/groups/802/15/pub/802.15%20Archives/802.15%20Archive%20pre-802WWW/2002/May02/02213r0P802-15_TG3-Analysis-of-ECC-Security-Proposals.doc
Executive Summary We compare the security of both ECC security proposals that are currently under consideration in Letter Ballot #16 of the IEEE 802.15.3 WPAN Task Group.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01432r0P802-15_TG3-MAC-Security-Proposal.doc
IF security is FALSE, THEN Promiscuously admit all DEVs based on security being off.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01477r0P802-15_TG3-Security-Rationale-for-802-15-3.doc
Security Needs 4.
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02217r0P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r6P802-15_TG3-D10-security-related-comment-resolutions.pdf
Add a secure frame counter, 2 octets, to all secure frames at the beginning of the frame, right after the time token.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r5P802-15_TG3-D10-security-related-comment-resolutions.pdf
Add a new element called the "secure frame counter." to every secure frame.
https://grouper.ieee.org/groups/802/15/pub/2002/Jul02/02217r2P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r4P802-15_TG3-D10-security-related-comment-resolutions.pdf
Secure frame counter (SFC) field The secure frame counter field shall be included in the frame body of all secure frames.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r7P802-15_TG3-D10-security-related-comment-resolutions.pdf
, SECID - security identi- fier.
https://grouper.ieee.org/groups/802/15/pub/2002/May02/02210r0P802-15_TG3-NTRU-Full-Security-Text-Proposal.pdf
Security Wireless networks face unique security challenges and WPANs are no exception.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r3P802-15_TG3-D10-security-related-comment-resolutions.pdf
If two DEVs in a secure piconet do not have a peer-to-peer security relationship, they may use the piconet group data key for secure commands and secure data frames transmitted between them.
https://grouper.ieee.org/groups/802/15/pub/2002/Jul02/02217r1P802-15_TG4-NTRU-Security-Architecture-Proposal.pdf
Security suite: A group of security operations designed to provide security services on MAC frames.
https://grouper.ieee.org/groups/802/15/pub/2002/Sep02/02334r2P802-15_TG3-D10-security-related-comment-resolutions.pdf
Secure frame counter (SFC) field The secure frame counter field contains a 2-octet counter that is used to ensure the uniqueness of the nonce in a secure frame.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01489r4P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/2001/Nov01/01489r3P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.
https://grouper.ieee.org/groups/802/15/pub/2002/Jan02/01489r3P802-15_TG3-Security-for-the-802.15.3-Wireless-Personal-Area-Network.doc
Privacy and Security 1.