-
1
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
[ACS02] Crypo'02
-
[ACS02] J.Algesheimer, J.Camenisch, V. Shoup. "Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products." Crypo'02, p417-432 LNCS 2442
-
LNCS
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
2
-
-
0034317075
-
Key agreement in ad-hoc networks
-
[AG00]
-
[AG00] N.Asokan, P.Ginzboorg. "Key Agreement in ad-hoc networks" Computer Communications, 23:1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
3
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
[AHNR02], Atlanta, Georgia, September
-
[AHNR02] B.Awerbuch, D.holmer, C. Nita-Rotaru, H.Rubens, "An on-demand secure routing protocol resilient to byzantine failures." In ACM Workshop on Wireless Security (WiSe'02), Atlanta, Georgia, September 2002
-
(2002)
ACM Workshop on Wireless Security (WiSe'02)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
4
-
-
84958752287
-
Towards a survivable security architecture for ad-hoc networks
-
th international work-shop. Cambridge, UK,April'01
-
th international work-shop. Cambridge, UK,April'01, LNCS 2467, p63-73 2002.
-
(2002)
LNCS
, vol.2467
, pp. 63-73
-
-
Aura, T.1
Maki, S.2
-
5
-
-
3142719375
-
-
[Baltimore]
-
[Baltimore] www.baltimore.com
-
-
-
-
6
-
-
33751044073
-
Talking to strangers:Authentication in ad-hoc wireless Networks
-
[BSSW02], San Diego, California, February
-
[BSSW02] D. Balfanz, D.K.Smetters, P.Stewart, H.Wong "Talking to strangers:Authentication in ad-hoc wireless Networks" NDSS '02, San Diego, California, February 2002
-
(2002)
NDSS '02
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.4
-
7
-
-
84958639277
-
Efficient generation of shared RSA keys
-
[BF97] Crypo'97
-
[BF97] D.Boneh, M.Franklin. "Efficient generation of shared RSA keys." Crypo'97, p425-439 LNCS 1294
-
LNCS
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
84948954120
-
Computing inverses over a shared secret modulus
-
[CGH00]. Eurocrypt'00
-
[CGH00] D.Catalano, R.Gennaro,S.Halevi "Computing inverses over a shared secret modulus". Eurocrypt'00, LNCS 1807, Pages 190-206
-
LNCS
, vol.1807
, pp. 190-206
-
-
Catalano, D.1
Gennaro, R.2
Halevi, S.3
-
10
-
-
85032188633
-
Society and group oriented cryptography:A new concept
-
[Des87]. Crypto '87
-
[Des87] Y. Desmedt. "Society and group oriented cryptography:A new concept". Crypto '87, p120-127 LNCS 293
-
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
11
-
-
85023809951
-
Threshold cryptosystems
-
[DF89], Crypto '89
-
[DF89] Y.Desmedt, Y.Frankel "Threshold Cryptosystems", Crypto '89, p307-315 LNCS 435
-
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
84946830669
-
Fully distributed threshold RSA under standard assumptions
-
[FS01], Asiacryp '01
-
[FS01] "Fully Distributed Threshold RSA under Standard Assumptions", Asiacryp '01,p310-330 LNCS 2248
-
LNCS
, vol.2248
, pp. 310-330
-
-
-
14
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
[hjky95], Crypto'95
-
[hjky95] A.Herzberg,S.Jarecki,H.Krawczyk,M.Yung. "Proactive Secret Sharing or: How to cope with perpetual leakage", Crypto'95, LNCS 963, p339-352.
-
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
15
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
[KZLLZ00]
-
[KZLLZ00] J.Kong,P.Zerfos,H.Luo,S.Lu,L.Zhang. "Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks". ICNP'01.
-
ICNP'01
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
16
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
[LL00], October'00, UCLA
-
[LL00] H.Luo,S.Lu "Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks". Technical report UCLA-CSD-TR-200030, October'00, UCLA.
-
Technical Report
, vol.UCLA-CSD-TR-200030
-
-
Luo, H.1
Lu, S.2
-
17
-
-
3142662204
-
-
[MIMwikipedia]
-
[MIMwikipedia] http://www.wikipedia.org/wiki/Man-in-the-middle_attack
-
-
-
-
20
-
-
3142753073
-
-
[PGP]
-
[PGP] http://www.pgpi.org
-
-
-
-
21
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
[PH02], San Antonio, Texas, January
-
[PH02] P.Papadimitratos,Z.Haas, "Secure routing for mobile ad hoc networks." In Proceedings of the SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS'02), San Antonio, Texas, January 2002, pp. 27-31.
-
(2002)
Proceedings of the SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS'02)
, pp. 27-31
-
-
Papadimitratos, P.1
Haas, Z.2
-
22
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
[R98], Crypto'98
-
[R98] T.Rabin. "A Simplified Approach to Threshold and Proactive RSA",Crypto'98,p 89-104, LNCS 1462
-
LNCS
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
25
-
-
84948954277
-
Practical threshold signatures
-
[Sho00], Eurocrypt 2000
-
[Sho00] V.Shoup, "Practical Threshold Signatures",Eurocrypt 2000, LNCS 1807,p207-220.
-
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
26
-
-
3142731002
-
-
[SPKI]
-
[SPKI] http://world.std.com/~cme/html/spki.html
-
-
-
-
27
-
-
3142660709
-
-
[Verisign]
-
[Verisign] www.verisign.com
-
-
-
-
28
-
-
3142738383
-
-
[X509]
-
[X509] http://www.ietf.org/html.charters/pkix-charter.html
-
-
-
-
31
-
-
0033357103
-
Securing ad hoc networks
-
[ZH99]
-
[ZH99] L.Zhou, Z.J.Haas. "Securing Ad Hoc Networks" IEEE Networks, 13(6):24-30,1999.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|