메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 294-308

Integrity (I) codes: Message integrity protection and authentication over insecure channels

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; DATA STRUCTURES; ERROR DETECTION; RADIO COMMUNICATION; SIGNAL ENCODING;

EID: 33751031293     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2006.23     Document Type: Conference Paper
Times cited : (36)

References (24)
  • 3
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad-hoc networks
    • November
    • N. Asokan and P. Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications, 23(17): 1627-1637, November 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 5
    • 0003035229 scopus 로고
    • A note on error detecting codes for asymmetric channel
    • J. M. Berger. A Note on Error Detecting Codes for Asymmetric Channel. Information and Control, 4:68-73, 1961.
    • (1961) Information and Control , vol.4 , pp. 68-73
    • Berger, J.M.1
  • 6
    • 0024767288 scopus 로고
    • On t-error correcting/all unidirectional error detecting codes
    • M. Blaum and H. van Tilborg. On t-Error Correcting/All Unidirectional Error Detecting Codes. IEEE Transactions on Computers, pages 1493-1501, 1989.
    • (1989) IEEE Transactions on Computers , pp. 1493-1501
    • Blaum, M.1    Van Tilborg, H.2
  • 7
    • 0020112169 scopus 로고
    • Optimal asymmetric error detecting codes
    • J. M. Borden. Optimal Asymmetric Error Detecting Codes. Information and Control, 53:66-73, 1982.
    • (1982) Information and Control , vol.53 , pp. 66-73
    • Borden, J.M.1
  • 10
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • January
    • C. Gehrmann, C. Mitchell, and K. Nyberg. Manual Authentication for Wireless Devices, January 2004. RSA Cryptobytes, Vol. 7, No. 1.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 11
    • 33645409711 scopus 로고    scopus 로고
    • Enhancements to bluetooth baseband security
    • Copenhagen, Denmark, November
    • C. Gehrmann and K. Nyberg. Enhancements to Bluetooth Baseband Security. In Proceedings of Nordsec, Copenhagen, Denmark, November 2001.
    • (2001) Proceedings of Nordsec
    • Gehrmann, C.1    Nyberg, K.2
  • 12
    • 77956950305 scopus 로고    scopus 로고
    • Private communication with M. Jakobsson
    • J.-O. Larsson and M. Jakobsson. SHAKE. Private communication with M. Jakobsson.
    • SHAKE
    • Larsson, J.-O.1    Jakobsson, M.2
  • 13
    • 0021494153 scopus 로고
    • Data integrity on digital optical discs
    • E. L. Leiss. Data Integrity on Digital Optical Discs. IEEE Transactions on Computers, 33:818-827, 1984.
    • (1984) IEEE Transactions on Computers , vol.33 , pp. 818-827
    • Leiss, E.L.1
  • 14
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology, 14(4):255-293, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 15
    • 84888819903 scopus 로고
    • United States Patent (No. 5,450,493): Secure communication method and apparatus
    • D. Maher. United States Patent (No. 5,450,493): Secure communication method and apparatus. http://www.uspto.gov, 1993.
    • (1993)
    • Maher, D.1
  • 17
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • C. Pomerance, editor. Springer-Verlag
    • R. C. Merkle. A Digital Signature Based on a Conventional Encryption Function. In C. Pomerance, editor, Lecture Notes in Computer Science (CRYPTO'87), volume 293, pages 369-378. Springer-Verlag, 1988.
    • (1988) Lecture Notes in Computer Science (CRYPTO'87) , vol.293 , pp. 369-378
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.