-
1
-
-
0031247110
-
Piconet: Embedded mobile networking
-
Oct.
-
F. Bennett, D. Clarke, J. Evans, A. Hopper, A. Jones, and D. Leask, "Piconet: embedded mobile networking," IEEE Personal Communications, vol. 4, pp. 8-15, Oct. 1997.
-
(1997)
IEEE Personal Communications
, vol.4
, pp. 8-15
-
-
Bennett, F.1
Clarke, D.2
Evans, J.3
Hopper, A.4
Jones, A.5
Leask, D.6
-
2
-
-
84978970377
-
Directed acyclic graphs, one-way functions and digital signatures
-
Advances in Cryptology - CRYPTO '94 (Y. Desmedt, ed.), Springer-Verlag
-
D. Bleichenbacher and U. Maurer, "Directed acyclic graphs, one-way functions and digital signatures," in Advances in Cryptology - CRYPTO '94 (Y. Desmedt, ed.), vol. 839 of Lecture Notes in Computer Science, pp. 75-82, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 75-82
-
-
Bleichenbacher, D.1
Maurer, U.2
-
3
-
-
85028913061
-
On-line/off-line digital signatures
-
Advances in Cryptology - CRYPTO '89 (G. Brassard, ed.), Springer-Verlag
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," in Advances in Cryptology - CRYPTO '89 (G. Brassard, ed.), vol. 435 of Lecture Notes in Computer Science, pp. 263-275, Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
4
-
-
33750582886
-
Fractal Merkle tree representation and traversal
-
Topics in Cryptology - RSA Conference Cryptographers' Track (RSA-CT '03), Springer
-
M. Jakobsson, T. Leighton, S. Micali, and M. Szydlo, "Fractal Merkle tree representation and traversal," in Topics in Cryptology - RSA Conference Cryptographers' Track (RSA-CT '03), vol. 2612 of Lecture Notes in Computer Science, Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
-
-
Jakobsson, M.1
Leighton, T.2
Micali, S.3
Szydlo, M.4
-
5
-
-
85116610435
-
Next century challenges: Mobile networking for "smart dust"
-
ACM Press, Aug.
-
J. Kahn, R. Katz, and K. Pister, "Next century challenges: Mobile networking for "smart dust"," in Proceedings of the 5th International Conference on Mobile Computing and Networking (MobiCom '99), pp. 483-492, ACM Press, Aug. 1999.
-
(1999)
Proceedings of the 5th International Conference on Mobile Computing and Networking (MobiCom '99)
, pp. 483-492
-
-
Kahn, J.1
Katz, R.2
Pister, K.3
-
6
-
-
0003605145
-
Constructing digital signatures from a one way function
-
SRI International, Oct.
-
L. Lamport, "Constructing digital signatures from a one way function," Technical Report CSL-98, SRI International, Oct. 1979.
-
(1979)
Technical Report
, vol.CSL-98
-
-
Lamport, L.1
-
8
-
-
84969346266
-
A certified digital signature
-
Advances in Cryptology CRYPTO '89 (G. Brassard, ed.), Springer-Verlag
-
R. C. Merkle, "A certified digital signature," in Advances in Cryptology CRYPTO '89 (G. Brassard, ed.), vol. 435 of Lecture Notes in Computer Science, pp. 218-238, Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
9
-
-
0035752112
-
The BiBa one-time signature and broadcast authentication protocol
-
ACM Press, New York, NY, USA
-
A. Perrig, "The BiBa one-time signature and broadcast authentication protocol," in Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), ACM Press, New York, NY, USA, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01)
-
-
Perrig, A.1
-
10
-
-
0034229951
-
Picoradio supports adhoc ultra-low power wireless networking
-
July
-
J. Rabaey, J. Ammer, J. da Silva, D. Patel, and S. Roundy, "Picoradio supports adhoc ultra-low power wireless networking," IEEE Computer Magazine, July 2000.
-
(2000)
IEEE Computer Magazine
-
-
Rabaey, J.1
Ammer, J.2
Da Silva, J.3
Patel, D.4
Roundy, S.5
-
11
-
-
84947431932
-
Better than BiBa: Short one-time signatures with fast signing and verifying
-
Proceedings of the 7th Australian Conference on Information Security and Privacy (J. Seberry, ed.), Springer-Verlag
-
L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proceedings of the 7th Australian Conference on Information Security and Privacy (J. Seberry, ed.), vol. 2384 of Lecture Notes in Computer Science, pp. 144-153, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
12
-
-
24644432967
-
Power evaluation of smartdust remote sensors
-
Berkeley Wireless Research Center
-
R. Szewczyk and A. Ferencz, "Power evaluation of smartdust remote sensors," CS252 project reports (final), Berkeley Wireless Research Center, 2000.
-
(2000)
CS252 Project Reports (Final)
-
-
Szewczyk, R.1
Ferencz, A.2
-
13
-
-
35048813651
-
Merkle tree traversal in log space and time
-
Advances in Cryptology - EUROCRYPT '04 (C. Cachin and J. Camenisch, eds.), Springer, May
-
M. Szydlo, "Merkle tree traversal in log space and time," in Advances in Cryptology - EUROCRYPT '04 (C. Cachin and J. Camenisch, eds.), vol. 3027 of Lecture Notes in Computer Science, pp. 541-554, Springer, May 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 541-554
-
-
Szydlo, M.1
-
15
-
-
3042642288
-
One-time identification with low memory
-
P.Camion, P.Chappin, and S.Harari, eds., no. 339 in CISM Courses and lectures, Springer-Verlag
-
S. Vaudenay, "One-time identification with low memory," in Proceedings of EUROCODE '92 (P.Camion, P.Chappin, and S.Harari, eds.), no. 339 in CISM Courses and lectures, pp. 217-228, Springer-Verlag, 1992.
-
(1992)
Proceedings of EUROCODE '92
, pp. 217-228
-
-
Vaudenay, S.1
-
16
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
M. J. Wiener, "Performance comparison of public-key cryptosystems," RSA Laboratories' CryptoBytes, vol. 4, no. 1, pp. 1+3-5, 1998.
-
(1998)
RSA Laboratories' CryptoBytes
, vol.4
, Issue.1
-
-
Wiener, M.J.1
|