-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtexcount.20150723
69 lines (68 loc) · 3.54 KB
/
texcount.20150723
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
File: di-pub.tex
Encoding: utf8
Words in text: 13761
Words in headers: 246
Words outside text (captions, etc.): 79
Number of headers: 59
Number of floats/tables/figures: 10
Number of math inlines: 2
Number of math displayed: 0
Subcounts:
text+headers+captions (#headers/#floats/#inlines/#displayed)
33+20+0 (3/0/0/0) _top_
248+1+0 (1/0/0/0) Chapter: Abstract
45+1+0 (1/0/0/0) Chapter: Tiivistelmä
241+1+0 (1/0/0/0) Chapter: Preface
133+5+0 (1/0/1/0) Chapter: List of abbreviations and symbols
103+1+0 (1/0/0/0) Chapter: Terminology
777+1+0 (1/0/0/0) Chapter: Introduction
202+4+0 (1/0/0/0) Chapter: Authentication, Authorization, and Trust
122+1+0 (1/0/0/0) Section: 802.1X
278+1+0 (1/0/0/0) Section: RADIUS
83+1+6 (1/1/0/0) Section: WPA
152+1+2 (1/1/0/0) Section: EAP
633+2+16 (1/2/0/0) Section: SIM-based authentication
293+1+0 (1/0/0/0) Section: Trust
34+6+0 (1/0/0/0) Section: Need for Security bootstrapping -> in Chapter
0+7+0 (1/0/0/0) Chapter: Managing Home Networks [or Home network architecture]
766+5+0 (1/0/0/0) Section: Home network architecture and IETF
176+4+0 (1/0/0/0) Section: Centralization trends in management
163+6+0 (1/0/0/0) Chapter: Design of home network trust anchor
926+9+0 (1/0/0/0) Section: Alternative methods for introducing trust anchor into the homenet
677+5+0 (1/0/0/0) Section: Flow of design (already above)
688+5+0 (1/0/0/0) Section: Chosen design and why (Rationale)
232+8+0 (1/0/0/0) Section: Access methods to Wi-Fi with only one SSID
175+8+0 (1/0/0/0) Subsection: HS2.0 [If deleted, remember also from conclusion! TBD]
999+4+40 (1/5/0/0) Section: Scenarios for authorization (AuthZ)
404+5+0 (1/0/1/0) Section: Ways to modify RADIUS messages
546+10+0 (1/0/0/0) Section: Privacy of smartphone user's identity (IMSI) [-> to secur. on cha\ref{sec-6} ]
136+4+0 (1/0/0/0) Section: Similarities with Lock-and-Key method
207+8+0 (1/0/0/0) Section: Chosen solution [OR Summary of the chosen solution]
45+2+0 (1/0/0/0) Chapter: Implemented Solution
174+4+6 (1/1/0/0) Section: EAP-SIM authentication test bed
223+5+0 (1/0/0/0) Section: Detailed description of test runs
628+7+0 (1/0/0/0) Section: Disconnecting the local controller and offline changes
354+7+0 (1/0/0/0) Section: Network traces (EAP, SIM, AUTH traffic analysis)
0+4+0 (1/0/0/0) Chapter: Analysis, Results and Discussion
95+2+0 (1/0/0/0) Section: Deployment difficulty
75+5+0 (1/0/0/0) Section: Estimating time to authenticate EAP-SIM
288+3+0 (1/0/0/0) Section: Costs for end-user
234+3+0 (1/0/0/0) Section: Platform specific issues
321+2+0 (1/0/0/0) Section: Security considerations
132+4+0 (1/0/0/0) Subsection: Accessibility, DoS and Scalability
174+8+0 (1/0/0/0) Subsection: RADIUS weaknesses and strengths in limited use cases
258+6+0 (1/0/0/0) Subsection: Replay, Re-use, Re-auth, and brute-force challenges
401+2+0 (1/0/0/0) Subsection: Mitigation methods
356+1+0 (1/0/0/0) Section: Discussion
0+7+0 (1/0/0/0) Chapter: [MISC to be added on right places]
78+2+0 (1/0/0/0) Section: facts TBD.
23+11+0 (1/0/0/0) Section: using EAP for other than network access, i.e., for application auth.
49+2+9 (1/0/0/0) Section: eap-psk rfc4764.txt
61+11+0 (1/0/0/0) Section: eap-sim acts similar than any other EAP challenge method (or not?)
279+1+0 (1/0/0/0) Chapter: Conclusion
14+0+0 (1/0/0/0) Chapter: \appA
4+3+0 (1/0/0/0) Section: shell, logging options
16+2+0 (1/0/0/0) Section: wpa-supplicant creds
2+3+0 (1/0/0/0) Section: RADIUS server conf
0+2+0 (1/0/0/0) Section: hlr auc
5+2+0 (1/0/0/0) Section: No sim