-
2
-
-
0030416036
-
Personnel identification system utilizing low probability of intercept techniques for covert operations
-
David J. Chiang, Michael C. Zari, Chris S. Anderson, Anthony F. Zwilling, Joe W. Fikes, David A. Hess, and Reeder N. Ward, "Personnel identification system utilizing low probability of intercept techniques for covert operations," Security Technology, 1996. 30th Annual 1996 International Carnahan Conference, 1996.
-
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference, 1996
-
-
Chiang, D.J.1
Zari, M.C.2
Anderson, C.S.3
Zwilling, A.F.4
Fikes, J.W.5
Hess, D.A.6
Ward, R.N.7
-
3
-
-
85030309636
-
Identification tokens-or: Solving the chess grandmaster problem
-
in Advances in Cryptology - CRYPTO '90, A.J. Menezes and S.A. Vanstone, Eds. International Association for Cryptologic Research; Springer-Verlag, Berlin Germany
-
Thomas Beth and Yvo Desmedt, "Identification tokens - or: Solving the chess grandmaster problem," in Advances in Cryptology - CRYPTO '90, A.J. Menezes and S.A. Vanstone, Eds. International Association for Cryptologic Research, 1991, vol. 537 of Lecture Notes in Computer Science, pp. 169-176, Springer-Verlag, Berlin Germany.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 169-176
-
-
Thomas, B.1
Yvo, D.2
-
4
-
-
0024135240
-
Zero-knowledge proofs of identity
-
Uriel Feige, Amos Fiat, and Adi Shamir, "Zero-knowledge proofs of identity," Journal of Cryptology, vol. 1, no. 2, pp. 77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
5
-
-
0013393395
-
A new approach towards secure IFF techniques
-
N. Ikram and S. J. Shepherd, "A new approach towards secure IFF techniques," in IEEE Military Communications Conference (MILCOM '98), Boston, Massachusetts, Oct 1998, pp. 18-21.
-
IEEE Military Communications Conference (MILCOM '98), Boston, Massachusetts, Oct 1998
, pp. 18-21
-
-
Ikram, N.1
Shepherd, S.J.2
-
6
-
-
84945138489
-
Identification protocols secure against reset attacks
-
in Advances in Cryptology - EUROCRYPT '2001, Birgit Pfitzmann, Ed., Innsbruck, Austria; Springer-Verlag, Berlin Germany
-
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, and Silvio Micali, "Identification protocols secure against reset attacks," in Advances in Cryptology - EUROCRYPT '2001, Birgit Pfitzmann, Ed., Innsbruck, Austria, 2001, vol. 2045 of Lecture Notes in Computer Science, pp. 493-508, Springer-Verlag, Berlin Germany.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 493-508
-
-
Bellare, M.1
Fischlin, M.2
Goldwasser, S.3
Micali, S.4
-
7
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
8
-
-
0013398251
-
Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
-
SEDEP Paris, France
-
Yvo Desmedt, "Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them," in SecuriCom '88, SEDEP Paris, France, 1988.
-
(1988)
SecuriCom '88
-
-
Desmedt, Y.1
-
9
-
-
0013393580
-
Location-based authentication: Grounding cyberspace for better security
-
Dorothy E. Denning and Peter J. Denning, Eds.; ACM Press / Addison-Wesley, New York; Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996
-
Dorothy E. Denning and Peter F. MacDoran, "Location-based authentication: Grounding cyberspace for better security," in Internet Besieged: Countering Cyberspace Scofflaws, Dorothy E. Denning and Peter J. Denning, Eds., pp. 167-174. ACM Press / Addison-Wesley, New York, 1998, Reprint from Computer Fraud and Security, Elsevier Science, Ltd, February 1996.
-
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 167-174
-
-
Denning, D.E.1
MacDoran, P.F.2
-
10
-
-
0013402235
-
Secure implementation of identification systems
-
Samy Bengio, Gilles Brassard, Yvo G. Desmedt, Claude Goutier, and Jean-Jacques Quisquater, "Secure implementation of identification systems," Journal of Cryptology, vol. 4, no. 3, pp. 175-183, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 175-183
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.G.3
Goutier, C.4
Quisquater, J.5
-
11
-
-
84976295016
-
Distance-bounding protocols
-
Advances in Cryptology - EUROCRYPT '93, T. Helleseth, Ed. International Association for Cryptologic Research, 1994; Springer-Verlag, Berlin Germany
-
Stefan Brands and David Chaum, "Distance-bounding protocols," in Advances in Cryptology - EUROCRYPT '93, T. Helleseth, Ed. International Association for Cryptologic Research, 1994, of Lecture Notes in Computer Science, pp. 344-359, Springer-Verlag, Berlin Germany.
-
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
12
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - CRYPTO '93, Douglas R. Stinson, Ed. International Association for Cryptologic Research; Springer-Verlag, Berlin, Germany
-
Mihir Bellare and Phillip Rogaway, "Entity authentication and key distribution," in Advances in Cryptology - CRYPTO '93, Douglas R. Stinson, Ed. International Association for Cryptologic Research, 1994, vol. 773 of Lecture Notes in Computer Science, pp. 232-249, Springer-Verlag, Berlin, Germany.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
84944980084
-
Spread spectrum goes commercial
-
Aug.
-
D. Schilling, R. Pickholz, and L. Milstein, "Spread spectrum goes commercial," IEEE Spectrum, pp. 41-45, Aug. 1990.
-
(1990)
IEEE Spectrum
, pp. 41-45
-
-
Schilling, D.1
Pickholz, R.2
Milstein, L.3
-
15
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Victoria Ashby, Ed., Fairfax, Virginia, Nov.; ACM Press
-
Mihir Bellare and Phillip Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proceedings of the 1st ACM Conference on Computer and Communications Security, Victoria Ashby, Ed., Fairfax, Virginia, Nov. 1993, pp. 62-73, ACM Press.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
0013347999
-
The PERSEUS system architecture
-
Tech. Rep. RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, Apr.
-
Birgit Pfitzmann, James Riordan, Christian Stüble, Michael Waidner, and Arnd Weber, "The PERSEUS system architecture," Tech. Rep. RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, Apr. 2001.
-
(2001)
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
18
-
-
0033294823
-
Authenticating public terminals
-
May
-
N. Asokan, Hervé Debar, Michael Steiner, and Michael Waidner, "Authenticating public terminals," Computer Networks, vol. 31, no. 8, pp. 861-870, May 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 861-870
-
-
Asokan, N.1
Debar, H.2
Steiner, M.3
Waidner, M.4
|