-
1
-
-
0028016794
-
"Overview of GSM: Philosophy and Results"
-
T. Haug, "Overview of GSM: Philosophy and Results," Int'l J. Wireless Information Networks, vol. 1, pp. 7-16, 1994.
-
(1994)
Int'l J. Wireless Information Networks
, vol.1
, pp. 7-16
-
-
Haug, T.1
-
2
-
-
11944275147
-
"T1P1.3/93-044RI, Draft Technical Report on Privacy and Authentication Objectives for Wireless Access to Personal Communications"
-
May
-
"T1P1.3/93-044RI, Draft Technical Report on Privacy and Authentication Objectives for Wireless Access to Personal Communications," pp. 9-11, May 1993.
-
(1993)
, pp. 9-11
-
-
-
3
-
-
84969340391
-
"Key Distribution Protocol for Digital Mobile Communication Systems"
-
M. Tatebayashi, N. Matsuzaki, and D.B. Newman, "Key Distribution Protocol for Digital Mobile Communication Systems," Advances in Cryptology: Proc. of Crypto '89, pp. 324-333, 1990.
-
(1990)
Advances in Cryptology: Proc. of Crypto '89
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
4
-
-
0027678720
-
"Scheme for Secure Digital Communication Based on Symmetric Key Cryptography"
-
T. Hwang, "Scheme for Secure Digital Communication Based on Symmetric Key Cryptography," Information Processing Letters, vol. 48, pp. 35-37, 1993.
-
(1993)
Information Processing Letters
, vol.48
, pp. 35-37
-
-
Hwang, T.1
-
6
-
-
0027641891
-
"Privacy and Authentication on a Portable Communications System"
-
Aug
-
M.J. Belier, L.F. Chang, and Y. Yacobi, "Privacy and Authentication on a Portable Communications System," IEEE J. Selected Areas. in Comm. vol. 11, pp. 821-829, Aug. 1993.
-
(1993)
IEEE J. Selected Areas. in Comm.
, vol.11
, pp. 821-829
-
-
Belier, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
7
-
-
0028272762
-
"Privacy and Authentication for Wireless Local Area Networks"
-
First Quarter
-
A. Ashar and W. Diffie, "Privacy and Authentication for Wireless Local Area Networks," IEEE Personal Comm., pp. 25-31, First Quarter 1994.
-
(1994)
IEEE Personal Comm.
, pp. 25-31
-
-
Ashar, A.1
Diffie, W.2
-
8
-
-
0027813901
-
"Authentication in Wireless Communications"
-
H.Y. Lin and L. Harn, "Authentication in Wireless Communications," Proc. IEEE Global Com '93, pp. 550-554, 1993.
-
(1993)
Proc. IEEE Global Com '93
, pp. 550-554
-
-
Lin, H.Y.1
Harn, L.2
-
9
-
-
0028397595
-
"Authentication of Mobile Users"
-
Mar./Apr
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network, pp. 26-34, Mar./Apr. 1994.
-
(1994)
IEEE Network
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
10
-
-
0029256120
-
"Conference Key Distribution Protocols for Digital Mobile Communication Systems"
-
M.S. Hwang and W.P. Yang, "Conference Key Distribution Protocols for Digital Mobile Communication Systems," IEEE J. Selected Areas in Comm., vol. 13, no. 2, pp. 416-420, 1995.
-
(1995)
IEEE J. Selected Areas in Comm.
, vol.13
, Issue.2
, pp. 416-420
-
-
Hwang, M.S.1
Yang, W.P.2
-
11
-
-
0012841060
-
"A Conference Distribution System for the Start Configuration Based on the Discrete Logarithm Problem"
-
S. Hirose and K. Ikeda, "A Conference Distribution System for the Start Configuration Based on the Discrete Logarithm Problem," Information Processing Letters, Vol. 62, no. 4, pp. 189-192, 1997.
-
(1997)
Information Processing Letters
, vol.62
, Issue.4
, pp. 189-192
-
-
Hirose, S.1
Ikeda, K.2
-
12
-
-
0033343111
-
"Dynamic Participation in a Secure Conference Scheme for Mobile Communications"
-
Sept
-
M.S. Hwang, "Dynamic Participation in a Secure Conference Scheme for Mobile Communications," IEEE Trans. Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sept. 1999.
-
(1999)
IEEE Trans. Vehicular Technology
, vol.48
, Issue.5
, pp. 1469-1474
-
-
Hwang, M.S.1
-
13
-
-
85027158725
-
"Efficient Anonymous Channel and All/Nothing Election Scheme"
-
C. Park, K. Itoh, and K. Kurosawa, "Efficient Anonymous Channel and All/ Nothing Election Scheme," Advances in Cryptology: Proc. EuroCrypto '93, pp. 248-259, 1993.
-
(1993)
Advances in Cryptology: Proc. EuroCrypto '93
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
15
-
-
84957375076
-
"A Secure and Optimally Efficient Multi-Authority Election Scheme"
-
R. Cramer, R. Gennaro, and B. Schoenmakers, "A Secure and Optimally Efficient Multi-Authority Election Scheme," Advances in Cryptology: Proc. EuroCrypt '97, pp. 103-118, 1997.
-
(1997)
Advances in Cryptology: Proc. EuroCrypt '97
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
16
-
-
85020598353
-
"Identity-Based Cryptosystems and Signature Schemes"
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Advances in Cryptology: Proc. Crypto '84, pp. 47-53, 1985.
-
(1985)
Advances in Cryptology: Proc. Crypto '84
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
0024665726
-
"Key Distribution System Based on Identification Information"
-
E. Okamota and K. Tanaka, "Key Distribution System Based on Identification Information," IEEE J. Select. Areas in Comm., vol. 7, no. 4, pp. 481-485, 1989.
-
(1989)
IEEE J. Select. Areas in Comm.
, vol.7
, Issue.4
, pp. 481-485
-
-
Okamota, E.1
Tanaka, K.2
-
18
-
-
0024664858
-
"An ID-Based Cryptosystem Based on the Discrete Logarithm Problem"
-
S. Tsujii and T. Itoh, "An ID-Based Cryptosystem Based on the Discrete Logarithm Problem," IEEE J. Selected Areas in Comm., vol. 7, no. 4, pp. 467-473, 1989.
-
(1989)
IEEE J. Selected Areas in Comm.
, vol.7
, Issue.4
, pp. 467-473
-
-
Tsujii, S.1
Itoh, T.2
-
21
-
-
84945315694
-
"Certification of Public Keys within an Identity Based System"
-
L. Chen, K. Harrison, A. Moss, D. Soldera, and N.P. Smart, "Certification of Public Keys within an Identity Based System," Proc. Fifth Int'l Information Security Conf. (ISC 2002), pp. 322-333, 2002.
-
(2002)
Proc. Fifth Int'l Information Security Conf. (ISC 2002)
, pp. 322-333
-
-
Chen, L.1
Harrison, K.2
Moss, A.3
Soldera, D.4
Smart, N.P.5
-
22
-
-
0017018484
-
"New Directions in Cryptography"
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
23
-
-
0017930809
-
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems"
-
R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
24
-
-
0004141908
-
-
second ed. Englewood, N.J.: Prentice Hall
-
A.S. Tanenbaum, Computer Networks, second ed. Englewood, N.J.: Prentice Hall, 1988.
-
(1988)
Computer Networks
-
-
Tanenbaum, A.S.1
-
25
-
-
0005301490
-
"On Data Banks and Privacy Homomorphisms"
-
R.A. DeMillo et al., eds., New York: Academic Press
-
R.L. Rivest, L. Adleman, and M.L. Dertouzos, "On Data Banks and Privacy Homomorphisms," Foundations of Secure Computation, R.A. DeMillo et al., eds., pp. 169-179, New York: Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
26
-
-
11944257365
-
"Secure Audio Teleconference"
-
E.F. Brickell, P.J. Lee, and Y. Yacobi, "Secure Audio Teleconference," Advances in Cryptology: Proc. Crypto '87, pp. 117-125, 1988.
-
(1988)
Advances in Cryptology: Proc. Crypto '87
, pp. 117-125
-
-
Brickell, E.F.1
Lee, P.J.2
Yacobi, Y.3
-
28
-
-
0018019325
-
"Hiding Information and Signatures in Trapdoor Knapsack"
-
Sept
-
R.C. Merkle and M.E. Hellman, "Hiding Information and Signatures in Trapdoor Knapsack," IEEE Trans. Information Theory, vol. 24, no. 5, pp. 525-530, Sept. 1978.
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.5
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
31
-
-
67651053584
-
"Pseudonym Systems"
-
A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, "Pseudonym Systems," Proc. Selected Areas in Cryptography '99 (SAC '99 , pp. 184-199, 1999.
-
(1999)
Proc. Selected Areas in Cryptography '99 (SAC '99)
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
32
-
-
0021484340
-
"A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem"
-
Sept
-
A. Shamir, "A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," IEEE Trans. Information Theory, vol. 30, no. 5, pp. 699-704, Sept. 1984.
-
(1984)
IEEE Trans. Information Theory
, vol.30
, Issue.5
, pp. 699-704
-
-
Shamir, A.1
-
33
-
-
0003855464
-
-
second ed. New York: John Wiley & Sons
-
B. Schneier, Applied Cryptography, second ed. New York: John Wiley & Sons, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
34
-
-
0003496351
-
"Knapsack Public Key Cryptosystems and Diophantine Approximation"
-
J.C. Lagarias, "Knapsack Public Key Cryptosystems and Diophantine Approximation," Advances in Cryptology: Proc. Crypto '83, pp. 3-23, 1984.
-
(1984)
Advances in Cryptology: Proc. Crypto '83
, pp. 3-23
-
-
Lagarias, J.C.1
-
35
-
-
0018545449
-
"How to Share a Secret"
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|