메뉴 건너뛰기




Volumn 4058 LNCS, Issue , 2006, Pages 295-312

Towards provable security for ubiquitous applications

Author keywords

Fault tolerance; MANET; RFID; Tracing malicious faults; Ubiquitous applications

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; CRYPTOGRAPHY; EMBEDDED SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 33746342177     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11780656_25     Document Type: Conference Paper
Times cited : (8)

References (38)
  • 4
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority. In Journal of Cryptology, vol. 4, no. 2, pp. 75122, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75122
    • Beaver, D.1
  • 5
    • 85014508412 scopus 로고
    • Multiparty computation with faulty majority
    • LNCS Springer-Verlag
    • D. Beaver and S. Goldwasser. Multiparty computation with faulty majority. In Proc. of Advances in Cryptology (CRYPTO 89), LNCS Vol. 435, pp. 589-590, Springer-Verlag, 1989.
    • (1989) Proc. of Advances in Cryptology (CRYPTO 89) , vol.435 , pp. 589-590
    • Beaver, D.1    Goldwasser, S.2
  • 6
    • 0032621035 scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • E.M. Belding-Royer and C.-K. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. In IEEE Personal Communications Magazine, pp. 46-55, 1991.
    • (1991) IEEE Personal Communications Magazine , pp. 46-55
    • Belding-Royer, E.M.1    Toh, C.-K.2
  • 8
    • 33746330954 scopus 로고    scopus 로고
    • Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
    • Elsevier
    • M. Burmester, T. Van Le, and A. Yasinsac. Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks. In Journal of Ad hoc Networks, vol. 4, no. 3, pp. 504-515, Elsevier, 2006.
    • (2006) Journal of Ad Hoc Networks , vol.4 , Issue.3 , pp. 504-515
    • Burmester, M.1    Van Le, T.2    Yasinsac, A.3
  • 9
    • 84941150932 scopus 로고    scopus 로고
    • Anonymous authentication with RFID devices
    • C. Chatmon, T. Le Van, and M. Burmester. Anonymous authentication with RFID devices. FSU Technical Report: TR-060112. Available at url http://www.sait.fsu.edu/research/rfid/index.shtml.
    • FSU Technical Report , vol.TR-060112
    • Chatmon, C.1    Van Le, T.2    Burmester, M.3
  • 11
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and composition of multi-party cryptographic protocols. In Journal of Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 12
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. of Foundations of Comp. Sci. (FOCS 2001), pp. 136-145, 2001.
    • (2001) Proc. of Foundations of Comp. Sci. (FOCS 2001) , pp. 136-145
    • Canetti, R.1
  • 14
    • 33646073024 scopus 로고    scopus 로고
    • Universally composable symbolic analysis of cryptographic protocols (The case of encryption-based mutual authentication and key exchange)
    • International Association for Cryptological Research
    • R. Canetti and J. Herzog. Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). In E-print Technical Report # 2004/334, International Association for Cryptological Research, 2004. Available at url http://eprint.iacr.org/2004/ 334
    • (2004) E-print Technical Report # 2004/334 , vol.2004 , Issue.334
    • Canetti, R.1    Herzog, J.2
  • 15
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • LNCS 2332, pp. 337-ff, Springer-Verlag
    • R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels (Extended Abstract). In Proc. of Advances in Cryptology (EUROCRYPT 2002), LNCS 2332, pp. 337-ff, Springer-Verlag, 2002.
    • (2002) Proc. of Advances in Cryptology (EUROCRYPT 2002)
    • Canetti, R.1    Krawczyk, H.2
  • 19
    • 33144487342 scopus 로고    scopus 로고
    • An active attack against HB+ - A provably secure lightweight authentication protocol
    • March Full paper available in E-print Technical Report # 2005/237, International Association for Cryptological Research
    • H. Gilbert, M. Rodshaw, and H. Sibert. An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. PerSec '04, March 2004. Full paper available in E-print Technical Report # 2005/237, International Association for Cryptological Research, Available at url http://eprint.iacr.org/ 2005/237.pdf
    • (2004) PerSec '04
    • Gilbert, H.1    Rodshaw, M.2    Sibert, H.3
  • 20
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • M. Hirt and U. Maurer. Player Simulation and General Adversary Structures in Perfect Multiparty Computation. In Journal of Cryptology, Vol. 13, No. 1, pp. 31-60, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 25
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad hoc network routing protocols
    • Y-C. Hu, A. Perrig and D.B. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proc. of WiSe2003, pp. 30-40, 2003.
    • (2003) Proc. of WiSe2003 , pp. 30-40
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 26
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad-hoc wireless networks
    • ed. T. Imielinski and H. Korth, Kluwer Academic Publisher
    • D.B. Johnson and D.A. Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks. In ed. T. Imielinski and H. Korth, Mobile Computing, Kluwer Academic Publisher, pp. 152-181, 1996.
    • (1996) Mobile Computing , pp. 152-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 27
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • LNCS pp. 293-ff, Springer-Verlag
    • A. Juels and S. A. Weiss. Authenticating Pervasive Devices with Human Protocols. In Proc. of Advances in Cryptology-CRYPTO 2005, LNCS vol. 3621, pp. 293-ff, Springer-Verlag, 2005.
    • (2005) Proc. of Advances in Cryptology-CRYPTO 2005 , vol.3621
    • Juels, A.1    Weiss, S.A.2
  • 28
  • 31
    • 0002949192 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing for mobile computers
    • C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing for Mobile Computers. In Computer Communications Review, pp. 224-244, 1994.
    • (1994) Computer Communications Review , pp. 224-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 38
    • 84941160603 scopus 로고    scopus 로고
    • Secure Ad hoc On-Demand Vector (SAODV) routing
    • Work in Progress
    • M. G. Zapata. Secure Ad hoc On-Demand Vector (SAODV) Routing. IETF Internet Draft. Available at url http://www.potaroo.net/ietf/all-ids/draft- guerreromanet-saodv-00.txt (Work in Progress).
    • IETF Internet Draft
    • Zapata, M.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.