-
4
-
-
84946838086
-
Efficient and mutually authenticated key exchange for low power computing devices
-
Gold Coast, Australia, December 9-13
-
th International conference on theory and Applications of Information Security, vol. 2248 pp. 272-289, Gold Coast, Australia, December 9-13, 2001.
-
(2001)
th International Conference on Theory and Applications of Information Security
, vol.2248
, pp. 272-289
-
-
Wong, D.S.1
Chan, A.H.2
-
5
-
-
84945247158
-
Password authenticated key exchange based on RSA for unbalanced wireless networks
-
Lecture Notes on Computer Science
-
F. Zhu, D. S. Wong, A. H. Chan, and R Ye, "Password authenticated key exchange based on RSA for unbalanced wireless networks", Proceedings of the 5th International Conference on Information Security, Lecture Notes on Computer Science, vol. 2433, pp. 150-161, 2002.
-
(2002)
Proceedings of the 5th International Conference on Information Security
, vol.2433
, pp. 150-161
-
-
Zhu, F.1
Wong, D.S.2
Chan, A.H.3
Ye, R.4
-
6
-
-
0027641891
-
Privacy and authentication on a portable communications systems
-
August
-
M. J. Beller, L. F. Chang, and J. Yacobi, "Privacy and authentication on a portable communications systems", IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, August 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, J.3
-
7
-
-
0028272762
-
A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, "A secure communications protocol to prevent unauthorized access, privacy and authentication for wireless local area networks", IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
8
-
-
19944387714
-
An elliptic curve cryptography based authentication and key agreement protocol for wireless communication
-
Dallas, Texas, October
-
nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Dallas, Texas, October 30, 1998.
-
(1998)
nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
, vol.30
-
-
Aydos, M.1
Sunar, B.2
Koc, C.K.3
-
9
-
-
0035482595
-
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
-
October
-
M. Aydos, T. Yanik, and C. K. Koc, "High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor", IEEE Proceedings on Communications, vol. 148 no. 5, pp. 273-279, October 2001.
-
(2001)
IEEE Proceedings on Communications
, vol.148
, Issue.5
, pp. 273-279
-
-
Aydos, M.1
Yanik, T.2
Koc, C.K.3
-
12
-
-
35048866891
-
New security results on encrypted key exchange
-
F. Bao, R. Deng and J. Zhou Eds, Springer-Verlag, LNCS 2947
-
th International Workshop on Theory and Practice in Public Key Crytptography - PKC 2004. F. Bao, R. Deng and J. Zhou Eds, Springer-Verlag, LNCS 2947 pp 145-158.
-
th International Workshop on Theory and Practice in Public Key Crytptography - PKC 2004
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
13
-
-
0742325040
-
Analysis of the SPEKE password-authenticated key exchange protocol
-
January
-
M. Zhang, "Analysis of the SPEKE password-authenticated key exchange protocol", IEEE Communications Letters, vol 8, no.l, pp 63-65, January 2004.
-
(2004)
IEEE Communications Letters
, vol.8
, Issue.50
, pp. 63-65
-
-
Zhang, M.1
-
14
-
-
0030261758
-
Strong password-only authenticated key exchange
-
October
-
D. Jablon, "Strong password-only authenticated key exchange", Comput. Commun. Rev., ACM SIGCOMM, vol 26, pp. 5-26, October 1996.
-
(1996)
Comput. Commun. Rev., ACM SIGCOMM
, vol.26
, pp. 5-26
-
-
Jablon, D.1
-
15
-
-
0037942544
-
Cryptanalysis of mutual authentication and key exchange for low power wireless communications
-
May
-
K. Shim, "Cryptanalysis of mutual authentication and key exchange for low power wireless communications", IEEE Communications Letters, vol. 7, no. 5, pp 248-250, May 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.5
, pp. 248-250
-
-
Shim, K.1
|