-
2
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
Dept. of Computer Science, UCLA
-
Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-200030, Dept. of Computer Science, UCLA (2000) Available online at http://citeseer.ist.psu.edu/luo00ubiquitous.html.
-
(2000)
Technical Report
, vol.TR-200030
-
-
Luo, H.1
Lu, S.2
-
3
-
-
0035704362
-
Providing robust and ubiquitous security support for MANET
-
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for MANET. In: IEEE 9th International Conference on Network Protocols (ICNP). (2001) 251-260
-
(2001)
IEEE 9th International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
4
-
-
0345755816
-
Adaptive security for multi-level ad-hoc networks
-
Kong, J., Luo, H., Xu, K., Gu, D.L., Gerla, M., Lu, S.: Adaptive Security for Multi-level Ad-hoc Networks. In: Journal of Wireless Communications and Mobile Computing (WCMC). Volume 2. (2002) 533-547
-
(2002)
Journal of Wireless Communications and Mobile Computing (WCMC)
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
5
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications (ISCC '02). (2002)
-
(2002)
Seventh IEEE Symposium on Computers and Communications (ISCC '02)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
14
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
University of Massachusetts
-
Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Technical Report UM-CS-2001-037, University of Massachusetts (2001)
-
(2001)
Technical Report
, vol.UM-CS-2001-037
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
15
-
-
21244475378
-
Sensing for danger
-
Hills, R.: Sensing for danger. Science Technology Report (2001) Available at http://www.llnl.gov/str/JulAug01/Hills.html.
-
(2001)
Science Technology Report
-
-
Hills, R.1
-
17
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: CRYPTO. (2001) 213-229
-
(2001)
CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
20
-
-
84947906522
-
The exact security of digital signatures - How to sign with RSA and Rabin
-
EUROCRYPT'96
-
Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and Rabin. In: EUROCRYPT'96. Volume 1070 of LNCS. (1996) 399-416
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
21
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal: A public-key cryptosystem and a signature scheme based on discrete logarithms. In: IEEE Transactions in Information Theory (IT-31). (1999) 469-472
-
(1999)
IEEE Transactions in Information Theory (IT-31)
, pp. 469-472
-
-
-
22
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4 (1991) 161-174
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
23
-
-
84927727752
-
Security proofs for signature schemes
-
EUROCRYPT'96
-
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: EUROCRYPT'96. Volume 1070 of LNCS. (1996) 387-398
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
25
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17 (1988) 281-308
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
26
-
-
72749106279
-
Algorithms for multi-exponentiation
-
Möller, B.: Algorithms for multi-exponentiation. In: Selected Areas in Cryptography. (2001) 165-180
-
(2001)
Selected Areas in Cryptography
, pp. 165-180
-
-
Möller, B.1
-
27
-
-
84955567079
-
Diffie-Hellman oracles
-
CRYPTO'96
-
Maurer, U.M., Wolf, S.: Diffie-Hellman oracles. In: CRYPTO'96. Volume 1109 of LNCS. (1996) 268-282
-
(1996)
LNCS
, vol.1109
, pp. 268-282
-
-
Maurer, U.M.1
Wolf, S.2
-
29
-
-
84974622621
-
Extended notions of security for multicast public key cryptosystems
-
International Colloquium on Automata, Languages and Programming (ICALP'00)
-
Baudron, O., Pointcheval, D., Stern, J.: Extended notions of security for multicast public key cryptosystems. In: International Colloquium on Automata, Languages and Programming (ICALP'00). Volume 1853 of LNCS. (2000) 499-511
-
(2000)
LNCS
, vol.1853
, pp. 499-511
-
-
Baudron, O.1
Pointcheval, D.2
Stern, J.3
-
30
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
EUROCRYPT'00
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: EUROCRYPT'00. Volume 1807 of LNCS. (2000) 259-274
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
31
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid encryption problem
-
EUROCRYPT'04
-
Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid encryption problem. In: EUROCRYPT'04. Volume 3027 of LNCS. (2004) 171-188
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
32
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
CRYPTO'99
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO'99. Volume 1666 of LNCS. (1999) 537-554
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
33
-
-
35248844436
-
An ID-based signature from Gap-Diffie-Hellmari groups
-
Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
-
Cha, J., Cheon, J.: An ID-based signature from Gap-Diffie-Hellmari Groups. In: Proceedings of International Workshop on Practice and Theory in Public Key Cryptography. Volume 2567 of LNCS. (2003) 18-30
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
|