IEEE P802.1X-2010 - Revision of 802.1X-2004. IEEE
draft standard for Local and Metropolitan Area
Networks- Port Based Network Access Control.
Hess, F. (2003). Efficient Identity Based Signature Schemes
Based on Pairings. In Nyberg, K., Heys, H. (eds.) SAC
2002. LNCS, vol. 2595, pp. 310-324. Springer, Hei-
delberg.
Yuan, Q. and Li, S. (2005). A New Efficient ID-Based Au-
thenticated Key Agreement Protocol. In Cryptology
ePrint Archive: Report 2005/309.
Boneh, D. and Franklin, M. (2001). Identity-based encryp-
tion from the Weil pairing. In Kilian, J. (ed.) CRYPTO
2001, LNCS, vol. 2139, pp. 213-229. Springer, Heidel-
berg.
Frey, G. and Ruck, H. G. (1994). A remark concerning
m-divisibility and the discrete logarithm in the divisor
class group of curves. In Mathematics of Computa-
tion, vol. 62, no. 206, 865-874.
Ryu, E., Yoon, E. and Yoo, K. (2004). An efficient ID-based
authenticated key agreement protocol from pairings.
In Mitrou, N., et al. (eds.) Networking 2004, LNCS,
vol. 3042, pp. 1458-1463. Springer, Heidelberg.
Park, Y., Lee, W. Y. and Rhee, K. H. (2007). Authenticated
On-Demand Ad Hoc Routing Protocol without Pre-
shared Key Distribution. In Proceedings of the 2007
ECSIS Symposium on Bio-inspired, Learning, and In-
telligent Systems for Security, Edinburg, pp. 41–46.
Edinburgh, UK.
Dutta, R., Barua, R. and Sarkar, P. (2004). Pairing-Based
Cryptographic Protocols : A Survey. In Cryptology
ePrint Archive: Report 2004/064.
Arkin, O. and Anderson, J. (2003). EtherLeak:
Ethernet frame padding information leakage.
http://www.packetstormsecurity.org/advisories/atstake
/atstake etherleak report.pdf
Bruschi, D., Ornaghi, A. and Rosti, E. (2003). S-ARP: a Se-
cure Address Resolution Protocol. In Proceedings of
the 19th Annual Computer Security Applications Con-
ference, pp. 66. Las Vegas, USA.
Lynn, B. (2007). On The Implementation of Pairing-based
Cryptosystems. Ph.D. Thesis. Stanford University. Re-
trieved March 29, 2009, from http://crypto.stanford
.edu/pbc/thesis.pdf
Lynn, B. (n.d.). PBC Library Manual 0.5.0. Retrieved
March 29, 2009, from http://crypto.stanford.edu/pbc
/manual.pdf
Eastlake, D. (2008). RFC: 5342 IANA Considerations and
IETF Protocol Usage for IEEE 802 Parameters.
Malkin, G. (1995). RFC: 1868 ARP Extension - UNARP.
Trusted Computing Group. (2003). Retrieved August
13, 2009, from http://en.wikipedia.org/wiki/Trusted
Computing Group
PBC Library. (n.d.). Retrieved March 29, 2009, from http://
crypto.stanford.edu/pbc/
Krovetz, T. (n.d.). Fast Cryptography. Retrieved December
16, 2009, from http://fastcrypto.org/
Huang, J., Lee, J. and Li, H. (2008). A Fast FPGA Imple-
mentation of Tate Pairing in Cryptography over Bi-
nary Field. In The 2008 International Conference on
Security and Management, pp. 3–9. Las Vegas, USA.
NetFPGA. (n.d.). Retrieved January 29, 2010, from
http://www.netfpga.org/
Junjie, J. (2007). Bilinear Pairing (Eta T Pairing) IP Core.
Retrieved December 08, 2009, from http://www.cs.
cityu.edu.hk/∼ecc/doc/etat datasheet v2.pdf
Yang, B., Mishra, S. and Karri, R. (2005). A High
Speed Architecture for Galois/Counter Mode of Op-
eration (GCM). In Cryptology ePrint Archive: Report
2005/146 (2005).
Friedman, D. and Nagle, D. (2001). Building Firewalls with
Intelligent Network Interface Cards. Technical report
CMUCS00173, Carnegie Mellon University.
Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula,
S. and Panda D. (2003). Towards NIC-based Intrusion
Detection. In Proceedings of the ninth ACM SIGKDD
international conference on Knowledge discovery and
data mining, pp. 723 – 728. Washington, USA.
Altunbasak, H., Krasser, S., Owen, H. L., Grimminger, J.,
Huth, H-P. and Sokol, J. (2004). Addressing the Weak
Link Between Layer 2 and Layer 3 in the Internet
Architecture. In The 29th Annual IEEE Conference
on Local Computer Networks (LCN), pp. 417–418.
Florida, USA.
Altunbasak, H. and Owen, H. L. (2007). Security Inter-
layering for Evolving and Future Network Architec-
tures. In Proceedings of IEEE SoutheastCon 2007,
pp. 615–620. Virginia, USA.
Understanding and Configuring DHCP Snooping. Cisco
IOS Software Configuration GuideRelease 12.1 (12c)
EW. (n.d.). Retrieved January 06, 2010, from http:
//www.cisco.com/en/US/docs/switches/lan/catalyst45
00/12.1/12ew/configuration/guide/dhcp.pdf
Jerschow, Y. I., Lochert, C., Scheuermann, B. and Mauve,
M. (2008). CLL: A Cryptographic Link Layer for Lo-
cal Area Networks. In R. Ostrovsky, R. De Prisco,
and I. Visconti (eds.) SCN 2008, LNCS, vol. 5229, pp.
21–38. Springer, Heidelberg.
Lootah, W., Enck, W. and McDaniel, P. (2005). TARP:
Ticket-based Address Resolution Protocol. In 21st
Annual Computer Security Applications Conference,
pp.106–116.
Park, Y. and Rhee, K. H. (2009). An Authenticated On-
Demand Routing Protocol with Key Exchange for Se-
cure MANET. In IEICE Trans. Inf. & Syst., vol.
E92.D, no. 5, pp. 810–817.
Z´uquete, A. and Marques, H. (2006). A Security Architec-
ture for Protecting LAN Interactions. In S.K. Katsikas
et al. (eds.) ISC 2006, LNCS. vol. 4176, pp. 311–326.
Springer, Heidelberg.
Wahid, K. F. (2010a). Maximizing Ethernet security by
switch-based single secure domain. In Proceedings of
the 7th International Conference on Information Tech-
nology : New Generations. Las Vegas, USA.
Wahid, K. F. (2010b). Rethinking the link security ap-
proach to manage large scale Ethernet network. In
Proceedings of the 17th IEEE Workshop on Local and
Metropolitan Area Networks. New Jersey, USA.
Federal Information Processing Standards Publication 197:
Advanced Encryption Standard (AES). (2001). http://
www.csrc.nist.gov/publications/fips/fips197/fips-197.
pdf
SECRYPT 2010 - International Conference on Security and Cryptography
260