-
1
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Aug.
-
Y. Frankel, A. Herzberg, P. A. Karger, H. Krawczyk, C. A. Kunzinger, and M. Yung, "Security issues in a CDPD wireless network," IEEE Personal Commun., vol. 2, pp. 16-27, Aug. 1995.
-
(1995)
IEEE Personal Commun.
, vol.2
, pp. 16-27
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.A.3
Krawczyk, H.4
Kunzinger, C.A.5
Yung, M.6
-
2
-
-
0029359261
-
Techniques for privacy and authentication in personal communication systems
-
Aug
-
D. Brown, "Techniques for privacy and authentication in personal communication systems," IEEE Personal Commun., vol. 2, pp. 6-10, Aug 1995.
-
(1995)
IEEE Personal Commun.
, vol.2
, pp. 6-10
-
-
Brown, D.1
-
3
-
-
0029358520
-
Privacy and authentication needs of PCS
-
Aug
-
J. E. Wilkes, "Privacy and authentication needs of PCS," IEEE Personal Commun., vol. 2, pp. 11-15, Aug 1995.
-
(1995)
IEEE Personal Commun.
, vol.2
, pp. 11-15
-
-
Wilkes, J.E.1
-
4
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Commun., vol. 1, no. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Commun.
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
5
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
6
-
-
0003508568
-
Data encryption standard
-
in National Bureau of Standards. Washington, DC: U. S. Dept. of Commerce, Jan
-
"Data encryption standard," in National Bureau of Standards. Washington, DC: U. S. Dept. of Commerce, Jan 1977.
-
(1977)
-
-
-
7
-
-
0002538320
-
A proposal for a new block encryption standard
-
X. Lai and J. Massey, "A proposal for a new block encryption standard," in Proc. EUROCRYPT'90, Aarhus, Denmark, May 1990, pp. 389-404.
-
Proc. EUROCRYPT'90, Aarhus, Denmark, May 1990
, pp. 389-404
-
-
Lai, X.1
Massey, J.2
-
8
-
-
84965066515
-
Advanced encryption standard
-
Washington, DC: U.S. Dept. of Commerce/N.I.S.T., Nov.
-
"Advanced encryption standard," in Federal Information Processing Standards Publications. Washington, DC: U.S. Dept. of Commerce/N.I.S.T., Nov. 2001.
-
(2001)
Federal Information Processing Standards Publications
-
-
-
9
-
-
84890522850
-
Communication theory of secret systems
-
C. E. Shannon, "Communication theory of secret systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
0020180459
-
A conference key distribution system
-
Sept.
-
I. Ingemarsson, D. T. Tang, and C. K. Wong, "A conference key distribution system," IEEE Trans. Inform. Theory, vol. IT-28, pp. 714-720, Sept. 1982.
-
(1982)
IEEE Trans. Inform. Theory
, vol.IT-28
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
11
-
-
0344405907
-
Identity-based conference key distribution system
-
K. Koyama and K. Ohta, "Identity-based conference key distribution system," in Proc. CRYPTO'87, Santa Barbara, CA, Aug 1987, pp. 194-202.
-
Proc. CRYPTO'87, Santa Barbara, CA, Aug 1987
, pp. 194-202
-
-
Koyama, K.1
Ohta, K.2
-
12
-
-
0002805974
-
A secure audio teleconference system
-
D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio teleconference system," in Proc. CRYPTO'88, Santa Barbara, CA, Aug 1988, pp. 520-528.
-
Proc. CRYPTO'88, Santa Barbara, CA, Aug 1988
, pp. 520-528
-
-
Steer, D.G.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
13
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Proc.f CRYPTO'92, Santa Barbara, CA, 1992, pp. 471-486.
-
Proc.f CRYPTO'92, Santa Barbara, CA, 1992
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
14
-
-
0029256120
-
Conference key distribution schemes for secure digital mobile communications
-
Feb
-
M. S. Hwang and W. P. Yang, "Conference key distribution schemes for secure digital mobile communications," IEEE J. Select. Areas Commun., vol. 13, pp. 416-420, Feb 1995.
-
(1995)
IEEE J. Select. Areas Commun.
, vol.13
, pp. 416-420
-
-
Hwang, M.S.1
Yang, W.P.2
-
15
-
-
0033343111
-
Dynamic participation in a secure conference scheme for mobile communications
-
Sept.
-
M. S. Hwang, "Dynamic participation in a secure conference scheme for mobile communications," IEEE Trans. Veh. Technol., vol. 48, pp. 1469-1474, Sept. 1999.
-
(1999)
IEEE Trans. Veh. Technol.
, vol.48
, pp. 1469-1474
-
-
Hwang, M.S.1
-
16
-
-
0035039150
-
Comments on 'Dynamic participation in a secure conference scheme for mobile communications'
-
Jan
-
S. L. Ng, "Comments on 'Dynamic participation in a secure conference scheme for mobile communications'," IEEE Trans. Veh. Technol., vol. 50, pp. 334-335, Jan 2001.
-
(2001)
IEEE Trans. Veh. Technol.
, vol.50
, pp. 334-335
-
-
Ng, S.L.1
-
17
-
-
0027641891
-
Privacy and authentication on a portable communications system
-
Aug
-
M. J. Beller, L. F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Select. Areas Commun., vol. 11, pp. 821-829, Aug 1993.
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
18
-
-
0003614758
-
Digital signature and public key functions as intractable as factorization
-
MIT Laboratory for Computer Science, Tech. Rep. MIT/LCS/TR-212, Jan
-
M. O. Rabin, "Digital signature and public key functions as intractable as factorization," MIT Laboratory for Computer Science, Tech. Rep. MIT/LCS/TR-212, Jan 1979.
-
(1979)
-
-
Rabin, M.O.1
-
19
-
-
0019080452
-
A modification of the RSA public key encryption procedure
-
Nov.
-
H. C. Williams, "A modification of the RSA public key encryption procedure," IEEE Trans. Inform. Theory, vol. IT-26, pp. 726-729, Nov. 1980.
-
(1980)
IEEE Trans. Inform. Theory
, vol.IT-26
, pp. 726-729
-
-
Williams, H.C.1
-
23
-
-
0041619709
-
Integer factoring
-
Mar
-
A. K. Lenstra, "Integer factoring," Design, Code and Cryptography, vol. 19, no. 2/3, pp. 101-128, Mar 2000.
-
(2000)
Design, Code and Cryptography
, vol.19
, Issue.2-3
, pp. 101-128
-
-
Lenstra, A.K.1
-
24
-
-
84956985315
-
Recent progress and prospects for integer factorization algorithm
-
R. P. Brent, "Recent progress and prospects for integer factorization algorithm," in Proceedings of COCOON'2000, Sydney, Australia, July 2000, pp. 3-22.
-
Proceedings of COCOON'2000, Sydney, Australia, July 2000
, pp. 3-22
-
-
Brent, R.P.1
-
28
-
-
0031556663
-
Hash function based on block cipher
-
Nov
-
X. Yi and K. Y. Lam, "Hash function based on block cipher," IEE Electronics Letters, vol. 33, no. 23, pp. 1938-1940, Nov 1997.
-
(1997)
IEE Electronics Letters
, vol.33
, Issue.23
, pp. 1938-1940
-
-
Yi, X.1
Lam, K.Y.2
-
29
-
-
84966243285
-
Modular multiplication without trial division
-
Apr
-
P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, no. 170, pp. 519-521, Apr 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
30
-
-
0000490812
-
A survey of fast exponentiation method
-
D. M. Gardon, "A survey of fast exponentiation method," Journal of Algorithms, vol. 27, no. 1, pp. 129-146, 1998.
-
(1998)
Journal of Algorithms
, vol.27
, Issue.1
, pp. 129-146
-
-
Gardon, D.M.1
|