-
1
-
-
4544376760
-
Combined web/mobile authentication for secure web access control
-
Al-Qaedi, A., Adi, W., Mabrouk, A. and Zahro, A., "Combined Web/Mobile Authentication for Secure Web Access Control", IEEE Wireless Communications and Networking Conference 2004, IEEE, 2004, pp. 677-681
-
(2004)
IEEE Wireless Communications and Networking Conference 2004, IEEE
, pp. 677-681
-
-
Al-Qaedi, A.1
Adi, W.2
Mabrouk, A.3
Zahro, A.4
-
2
-
-
0002757750
-
Keying hash functions for message authentication
-
Bellare, M., Canetti, R. and Krawczyk, H., "Keying Hash Functions for Message Authentication", In proceedings of CRYPTO 1996, LNCS 1109, 1996
-
(1996)
Proceedings of CRYPTO 1996, LNCS 1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84945119254
-
Authentication and key distribution
-
Bellare, M., and Rogaway, P., "Authentication and key distribution", In Proceedings of CRYPTO 1993, LNCS 773, 1993. pp. 232-249
-
(1993)
Proceedings of CRYPTO 1993, LNCS 773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Bellovin, S., and Merritt, M., "Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks", In Proceedings of the Symposium on Security and Privacy, IEEE, 1992. pp. 72-84
-
(1992)
Proceedings of the Symposium on Security and Privacy, IEEE
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
5
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
Bird, R., Gopal, I., Herzberg, A., Janson, P. A., Kutten, S., Molva. R. and Moti, Y., "Systematic Design of a family of Attack-Resistant Authentication Protocols", IEEE Journal on Selected Areas in Communications, 11(5), 1993, pp. 679-693
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Moti, Y.7
-
6
-
-
84937957330
-
-
Bluetooth Specification-Version 1. 2, 2003
-
http://www. bluetooth. org, Bluetooth Specification-Version 1. 2, 2003
-
-
-
-
7
-
-
0002155224
-
Combining world wide web and wireless security
-
Claessens, J., Preneel, B. and Vandewalle, J., "Combining World Wide Web and Wireless Security", Proceedings of IFIP I-NetSec 2001: Advances in Network and Distributed Systems Security, 2001, pp. 153-172
-
(2001)
Proceedings of IFIP I-NetSec 2001: Advances in Network and Distributed Systems Security
, pp. 153-172
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
8
-
-
0347313908
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
LNCS 2501
-
Courtois, N. and Pieprzyk, J., "Cryptanalysis of Block Ciphers with Overdefined Systems of Equations", Proceedings of Asiacrypt 2002, 2002, LNCS 2501, pp. 153-172
-
(2002)
Proceedings of Asiacrypt 2002
, pp. 153-172
-
-
Courtois, N.1
Pieprzyk, J.2
-
9
-
-
85028450627
-
Non-malleable cryptography
-
Dolev, D. and Dwork, C. and Naor, M., "Non-Malleable Cryptography", In 23rd ACM Symposium on the Theory of Computing, 1991, pp. 542-552
-
(1991)
23rd ACM Symposium on the Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
11
-
-
84935078039
-
Security weaknesses in bluetooth
-
Jakobsson, M. and Wetzel, S., "Security weaknesses in Bluetooth", Topics in Cryptology-CT-RSA 2001, LNCS 2020, 2001, pp. 176-191
-
(2001)
Topics in Cryptology-CT-RSA 2001, LNCS 2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
16
-
-
35048894912
-
Faster correlation attacks on bluetooth keystream generator e0
-
Lu, Y. and Vaudenay, S., "Faster Correlation Attacks on Bluetooth Keystream Generator E0", Advances in Cryptology-CRYPTO 2004, 2004, pp. 407-425
-
(2004)
Advances in Cryptology-CRYPTO 2004
, pp. 407-425
-
-
Lu, Y.1
Vaudenay, S.2
|