-
1
-
-
0029697680
-
-
R. Anderson, A security policy model for clinical information systems, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996, pp. 34-48.
-
-
-
-
3
-
-
33750006400
-
-
Bluetooth SIG, Core Specification of the Bluetooth System. Version 2.0 + EDR, November 2004.
-
-
-
-
5
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 4 (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
6
-
-
0036282473
-
-
O. Elkeelany, M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, et al., Performance analysis of IPSec protocol: encryption and authentication, in: Proceedings of IEEE International Conference on Communications ICC 2002, vol. 2, 2002, pp. 1164-1168.
-
-
-
-
8
-
-
33646492430
-
Cryptographic protection of databases and software
-
Feigenbaum J., and Merritt M. (Eds), American Mathematical Society, Providence, RI
-
Feigenbaum J., Liberman M., and Wright R.N. Cryptographic protection of databases and software. In: Feigenbaum J., and Merritt M. (Eds). Distributed Computing and Cryptography (1991), American Mathematical Society, Providence, RI 161-172
-
(1991)
Distributed Computing and Cryptography
, pp. 161-172
-
-
Feigenbaum, J.1
Liberman, M.2
Wright, R.N.3
-
9
-
-
0003730335
-
-
Prentice Hall, Upper Saddle River, NJ
-
Garg V.K., Smolik K., and Wilkes J.E. Applications of CDMA in Wireless/Personal Communications (1998), Prentice Hall, Upper Saddle River, NJ
-
(1998)
Applications of CDMA in Wireless/Personal Communications
-
-
Garg, V.K.1
Smolik, K.2
Wilkes, J.E.3
-
10
-
-
33750009955
-
-
IEEE. Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York, NY, October 2003.
-
-
-
-
11
-
-
33750003516
-
-
R. Merkle, A digital signature based on a conventional encryption function, in: Proceedings of the Advances in Cryptology-CRYPTO '87, 1998, pp. 369-378.
-
-
-
-
12
-
-
84969346266
-
-
R. Merkle, A certified digital signature, in: Proceedings of the Advances in Cryptology-CRYPTO '88, 1990, pp. 218-238.
-
-
-
-
13
-
-
33750032811
-
-
R. Merkle, Method of providing digital signatures. US patent # 4,309,569, January 5, 1982.
-
-
-
-
15
-
-
33750297757
-
-
V.B. Mišić, J. Fung, J. Mišić. MAC layer security of 802.15.4-compliant networks, in: Proceedings of the WSNS'05, held in conjunction with IEEE MASS05 2005, Washington, DC, December 2005.
-
-
-
-
16
-
-
33749988136
-
-
CRC Press, Boca Raton FL July
-
Mišić J., and Mišić V.B. Performance Modeling and Analysis of Bluetooth Networks: Network Formation, Polling, Scheduling, and Traffic Control (2005), CRC Press, Boca Raton FL July
-
(2005)
Performance Modeling and Analysis of Bluetooth Networks: Network Formation, Polling, Scheduling, and Traffic Control
-
-
Mišić, J.1
Mišić, V.B.2
-
17
-
-
33749999070
-
-
National Institute of Standards. Digital Signature Standard. Gaithersburg, MD: US Department of Commerce, 1994.
-
-
-
-
20
-
-
0034440924
-
-
S. Zürbes, Considerations on link and system throughput of Bluetooth networks, in: Proceedings of the 11th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2000, vol. 2, London, UK, September 2000, pp. 1315-1319.
-
-
-
|