-
3
-
-
85029542707
-
-
Proc. CRYPTO '91, Springer Verlag LNCS
-
D. Beaver, Foundations of secure interactive computing, Proc. CRYPTO '91, Springer Verlag LNCS, vol. 576, pp. 377-391, 1991.
-
(1991)
Foundations of Secure Interactive Computing
, vol.576
, pp. 377-391
-
-
Beaver, D.1
-
4
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority. In Journal of Cryptology, vol. 4, no. 2, pp. 75122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75122
-
-
Beaver, D.1
-
5
-
-
85014508412
-
Multiparty computation with faulty majority
-
LNCS Springer-Verlag
-
D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Proc. of Advances in Cryptology (CRYPTO 89), LNCS Vol. 435, pp. 589-590, Springer-Verlag, 1989.
-
(1989)
Proc. of Advances in Cryptology (CRYPTO 89)
, vol.435
, pp. 589-590
-
-
Beaver, D.1
Goldwasser, S.2
-
6
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
E.M. Belding-Royer and C.-K. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. In IEEE Personal Communications Magazine, pp. 46-55, 1991.
-
(1991)
IEEE Personal Communications Magazine
, pp. 46-55
-
-
Belding-Royer, E.M.1
Toh, C.-K.2
-
8
-
-
33746330954
-
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
-
Elsevier
-
M. Burmester, T. Van Le, and A. Yasinsac. Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks. In Journal of Ad hoc Networks, vol. 4, no. 3, pp. 504-515, Elsevier, 2006.
-
(2006)
Journal of Ad Hoc Networks
, vol.4
, Issue.3
, pp. 504-515
-
-
Burmester, M.1
Van Le, T.2
Yasinsac, A.3
-
9
-
-
84941150932
-
Anonymous authentication with RFID devices
-
C. Chatmon, T. Le Van, and M. Burmester. Anonymous authentication with RFID devices. FSU Technical Report: TR-060112. Available at url http://www.sait.fsu.edu/research/rfid/index.shtml.
-
FSU Technical Report
, vol.TR-060112
-
-
Chatmon, C.1
Van Le, T.2
Burmester, M.3
-
11
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti. Security and composition of multi-party cryptographic protocols. In Journal of Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
12
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. of Foundations of Comp. Sci. (FOCS 2001), pp. 136-145, 2001.
-
(2001)
Proc. of Foundations of Comp. Sci. (FOCS 2001)
, pp. 136-145
-
-
Canetti, R.1
-
14
-
-
33646073024
-
Universally composable symbolic analysis of cryptographic protocols (The case of encryption-based mutual authentication and key exchange)
-
International Association for Cryptological Research
-
R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). In E-print Technical Report # 2004/334, International Association for Cryptological Research, 2004. Available at url http://eprint.iacr.org/2004/ 334
-
(2004)
E-print Technical Report # 2004/334
, vol.2004
, Issue.334
-
-
Canetti, R.1
Herzog, J.2
-
15
-
-
84947232363
-
Universally composable notions of key exchange and secure channels
-
LNCS 2332, pp. 337-ff, Springer-Verlag
-
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels (Extended Abstract). In Proc. of Advances in Cryptology (EUROCRYPT 2002), LNCS 2332, pp. 337-ff, Springer-Verlag, 2002.
-
(2002)
Proc. of Advances in Cryptology (EUROCRYPT 2002)
-
-
Canetti, R.1
Krawczyk, H.2
-
16
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
ACM Press
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai. Universally Composable Two-Party and Multi-Party Secure Computation. In Proc. of the ACM Symposim on Theory of Computing, vol. 34, pp. 494-503, ACM Press, 2002.
-
(2002)
Proc. of the ACM Symposim on Theory of Computing
, vol.34
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
19
-
-
33144487342
-
An active attack against HB+ - A provably secure lightweight authentication protocol
-
March Full paper available in E-print Technical Report # 2005/237, International Association for Cryptological Research
-
H. Gilbert, M. Rodshaw, and H. Sibert. An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. PerSec '04, March 2004. Full paper available in E-print Technical Report # 2005/237, International Association for Cryptological Research, Available at url http://eprint.iacr.org/ 2005/237.pdf
-
(2004)
PerSec '04
-
-
Gilbert, H.1
Rodshaw, M.2
Sibert, H.3
-
20
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer. Player Simulation and General Adversary Structures in Perfect Multiparty Computation. In Journal of Cryptology, Vol. 13, No. 1, pp. 31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
21
-
-
0142188056
-
Initiator-resilient universally composable key exchange
-
LNCS 2808, Springer-Verlag
-
D. Hofheinz, J. Müller-Quade, and R. Steinwandt. Initiator-Resilient Universally Composable Key Exchange. In Proc. of the European Symp. on Research in Computer Security (ESORICS 2003), LNCS 2808, pp. 61-84, Springer-Verlag, 2003.
-
(2003)
Proc. of the European Symp. on Research in Computer Security (ESORICS 2003)
, pp. 61-84
-
-
Hofheinz, D.1
Müller-Quade, J.2
Steinwandt, R.3
-
24
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
IEEE, Calicoon, NY
-
Y-C Hu, D.B. Johnson and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In Proc. 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), IEEE, Calicoon, NY, 2002.
-
(2002)
Proc. 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
25
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y-C. Hu, A. Perrig and D.B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proc. of WiSe2003, pp. 30-40, 2003.
-
(2003)
Proc. of WiSe2003
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
26
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
ed. T. Imielinski and H. Korth, Kluwer Academic Publisher
-
D.B. Johnson and D.A. Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks. In ed. T. Imielinski and H. Korth, Mobile Computing, Kluwer Academic Publisher, pp. 152-181, 1996.
-
(1996)
Mobile Computing
, pp. 152-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
27
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
LNCS pp. 293-ff, Springer-Verlag
-
A. Juels and S. A. Weiss. Authenticating Pervasive Devices with Human Protocols. In Proc. of Advances in Cryptology-CRYPTO 2005, LNCS vol. 3621, pp. 293-ff, Springer-Verlag, 2005.
-
(2005)
Proc. of Advances in Cryptology-CRYPTO 2005
, vol.3621
-
-
Juels, A.1
Weiss, S.A.2
-
31
-
-
0002949192
-
Highly dynamic destination-sequenced distance-vector routing for mobile computers
-
C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing for Mobile Computers. In Computer Communications Review, pp. 224-244, 1994.
-
(1994)
Computer Communications Review
, pp. 224-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
38
-
-
84941160603
-
Secure Ad hoc On-Demand Vector (SAODV) routing
-
Work in Progress
-
M. G. Zapata. Secure Ad hoc On-Demand Vector (SAODV) Routing. IETF Internet Draft. Available at url http://www.potaroo.net/ietf/all-ids/draft- guerreromanet-saodv-00.txt (Work in Progress).
-
IETF Internet Draft
-
-
Zapata, M.G.1
|