-
1
-
-
33845639580
-
-
ETSI TS-123-060 General Packet Radio Services (GPRS) Service Description (Stage 2)., European Telecommunications Standards Institute ETSI TS-123-060, Sophia Antipolis Cedex, France
-
ETSI TS-123-060 (2002) General Packet Radio Services (GPRS) Service Description (Stage 2)., European Telecommunications Standards Institute ETSI TS-123-060, Sophia Antipolis Cedex, France.
-
(2002)
-
-
-
2
-
-
33845652596
-
Wireless LAN media access control (MAC) and physical layer (PHY) specifications
-
ANSI/EEEE Std. 802.11 ANSI/EEEE Std. 802.11 (E) ISO/EEC 8802-11, EEEE Standards Association, Piscataway, USA
-
ANSI/EEEE Std. 802.11 (1999) Wireless LAN media access control (MAC) and physical layer (PHY) specifications. ANSI/EEEE Std. 802.11 (E) Part 11, ISO/EEC 8802-11, EEEE Standards Association, Piscataway, USA.
-
(1999)
, Issue.PART 11
-
-
-
3
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Yang, H., Luo, H., Ye, F., Lu, S. and Zhang, L. (2004) Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Commun., 11, 38-47.
-
(2004)
IEEE Wireless Commun.
, vol.11
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
4
-
-
13244255382
-
Peer-to-Peer Security in Mobile Devices: A User Perspective
-
In Zurich, Switzerland, August 15-17, IEEE Press, NJ
-
Campadello, S. (2004) Peer-to-Peer Security in Mobile Devices: A User Perspective. In Proc. Fourth Int. Conf. Peer-to-Peer Computing (P2P'04), Zurich, Switzerland, August 15-17, pp. 252-257. IEEE Press, NJ.
-
(2004)
Proc. Fourth Int. Conf. Peer-to-Peer Computing (P2P'04)
, pp. 252-257
-
-
Campadello, S.1
-
5
-
-
0036949030
-
Challenge: Integrating mobile wireless devices into the computational grid
-
Atlanta, Georgia, USA, September 23-28
-
Phan, T., Huang, L. and Dulan, C. (2002) Challenge: Integrating mobile wireless devices into the computational grid. MobiCom'02, Atlanta, Georgia, USA, September 23-28, pp. 271-278.
-
(2002)
MobiCom'02
, pp. 271-278
-
-
Phan, T.1
Huang, L.2
Dulan, C.3
-
6
-
-
0020180459
-
A conference key distribution system
-
Ingemaresson, I., Tang, T. D. and Wong, C. K. (1982) A conference key distribution system. IEEE Trans. Infom. Theory, 28, 714-720.
-
(1982)
IEEE Trans. Infom. Theory
, vol.28
, pp. 714-720
-
-
Ingemaresson, I.1
Tang, T.D.2
Wong, C.K.3
-
7
-
-
0029256120
-
Conference key distribution schemes for secure digital mobile communications
-
Hwang, M. S. and Yang, W. P. (1995) Conference key distribution schemes for secure digital mobile communications. IEEE J. Sel. Areas Comm., 13, 416-420.
-
(1995)
IEEE J. Sel. Areas Comm.
, vol.13
, pp. 416-420
-
-
Hwang, M.S.1
Yang, W.P.2
-
8
-
-
0347309397
-
Cryptanalysis and improvement of key distribution system for VS AT satellite communication
-
Tseng, Y. M. (2002) Cryptanalysis and improvement of key distribution system for VS AT satellite communication. Int. J. Informatica, 13, 369-376.
-
(2002)
Int. J. Informatica
, vol.13
, pp. 369-376
-
-
Tseng, Y.M.1
-
9
-
-
0032629876
-
Anonymous conference key distribution systems based on the discrete logarithm problem
-
Tseng, Y. M. and Jan, J. K. (1999) Anonymous conference key distribution systems based on the discrete logarithm problem. Comput. Commun., 22, 749-754.
-
(1999)
Comput. Commun.
, vol.22
, pp. 749-754
-
-
Tseng, Y.M.1
Jan, J.K.2
-
10
-
-
0031629148
-
CLIQUES: A new approach to group key agreement
-
In Amsterdam, The Netherlands, May 26-29, IEEE Press, NJ
-
Steiner, M., Tsudik, G. and Waidner, M. (1998) CLIQUES: A new approach to group key agreement. In Proc. 18th Int. Conf. Distributed Computing. Syst. (ICDCS'98), Amsterdam, The Netherlands, May 26-29, pp. 380-387. IEEE Press, NJ.
-
(1998)
Proc. 18th Int. Conf. Distributed Computing. Syst. (ICDCS'98)
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
11
-
-
84948991087
-
A secure and efficient conference key distribution system
-
In Perugia, Italy, May 9-12, LNCS, 950, Springer-Verlag, Berlin
-
Burmester, M. and Desmedt, Y. (1994) A secure and efficient conference key distribution system. In Advances in Cryptology - Proceedings of Eurocrypt'94, Perugia, Italy, May 9-12, LNCS, 950, pp. 275-286. Springer-Verlag, Berlin.
-
(1994)
Advances in Cryptology - Proceedings of Eurocrypt'94
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
12
-
-
0033748607
-
New multi-party authentication services and key agreement protocols
-
Ateniese, G., Steiner, M. and Tsudik, G. (2000) New multi-party authentication services and key agreement protocols. IEEE J. Sel. Areas Comm., 18, 628-639.
-
(2000)
IEEE J. Sel. Areas Comm.
, vol.18
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
13
-
-
0035751060
-
Provably Authenticated Group Diffie-Hellman Key Exchange
-
In Philadelphia, Pennsylvania, USA, November 5-8, ACM Press, New York
-
Bresson, E., Chevassut, O., Pointcheval, D. and Quisquater, J. J. (2001) Provably Authenticated Group Diffie-Hellman Key Exchange. In Proc. 8th Annual ACM Conf. Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 5-8, pp. 255-264. ACM Press, New York.
-
(2001)
Proc. 8th Annual ACM Conf. Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
14
-
-
50849092893
-
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
-
In Amsterdam, The Netherlands, April 28 May 2, LNCS 2332, Springer-Verlag, Berlin
-
Bresson, E., Chevassut, O. and Pointcheval, D. (2002) Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In Proc. Eurocrypt 2002, Amsterdam, The Netherlands, April 28 May 2, LNCS 2332, pp. 321-336. Springer-Verlag, Berlin.
-
(2002)
Proc. Eurocrypt 2002
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
15
-
-
35248878854
-
Scalable Protocols for Authenticated Group Key Exchange
-
Santa Barbara, CA, August 17-21, LNCS 2729
-
Katz, J. and Yung, M. (2003) Scalable Protocols for Authenticated Group Key Exchange. Advances in Cryptology-Proceedings of Crypto'03, Santa Barbara, CA, August 17-21, pp. 110-125, LNCS 2729.
-
(2003)
Advances in Cryptology-Proceedings of Crypto'03
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
16
-
-
25844432081
-
A robust multi-party key agreement protocol resistant to malicious participants
-
Tseng, Y. M. (2005) A robust multi-party key agreement protocol resistant to malicious participants. Comput J., 48, 480-487.
-
(2005)
Comput J.
, vol.48
, pp. 480-487
-
-
Tseng, Y.M.1
-
17
-
-
0034822650
-
A security analysis of the cliques protocol suites
-
In Cape Breton, Nova Scotia, Canada, June 11-13, IEEE Press, NJ
-
Pereira, O. and Quisquater, J. J. (2001) A security analysis of the cliques protocol suites. In Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June 11-13, pp. 73-81. IEEE Press, NJ.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 73-81
-
-
Pereira, O.1
Quisquater, J.J.2
-
18
-
-
0034317075
-
Key agreement in ad hoc networks
-
Asokan, N. and Ginzboorg, P. (2000) Key agreement in ad hoc networks. Comput. Commun., 23, 1627-1637.
-
(2000)
Comput. Commun.
, vol.23
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
19
-
-
35248878662
-
Round-optimal contributory conference key agreement
-
In Miami, USA, January 6-8, LNCS 2567, Springer-Verlag, Berlin
-
Boyd, C. and Nieto, G. (2003) Round-optimal contributory conference key agreement. In Proc. Public-Key Cryptography'03, Miami, USA, January 6-8, LNCS 2567, pp. 161-174. Springer-Verlag, Berlin.
-
(2003)
Proc. Public-Key Cryptography'03
, pp. 161-174
-
-
Boyd, C.1
Nieto, G.2
-
20
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
In Fairfax, Virginia, November 3-5, ACM Press, New York
-
Bellare, M. and Rogaway, P. (1993) Random oracles are practical: A paradigm for designing efficient protocols. In Proc. 1st Annual ACM Conference on Computer and Communications Security (ACM CCS'93), Fairfax, Virginia, November 3-5, pp. 62-73. ACM Press, New York.
-
(1993)
Proc. 1st Annual ACM Conference on Computer and Communications Security (ACM CCS'93)
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
21
-
-
0036643547
-
Robust generalized MQV key agreement protocol without using one-way hash functions
-
Tseng, Y. M. (2002) Robust generalized MQV key agreement protocol without using one-way hash functions. Comput. Stand. Interface, 24, 241-246.
-
(2002)
Comput. Stand. Interface
, vol.24
, pp. 241-246
-
-
Tseng, Y.M.1
-
22
-
-
4544386246
-
Multual authentication and group key agreement for low-power mobile devices
-
Bresson, E., Chevassut, O., Essiari, A. and Pointcheval, D. (2004) Multual authentication and group key agreement for low-power mobile devices. Comput. Commun., 27, 1730-1737.
-
(2004)
Comput. Commun.
, vol.27
, pp. 1730-1737
-
-
Bresson, E.1
Chevassut, O.2
Essiari, A.3
Pointcheval, D.4
-
23
-
-
19644371756
-
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
-
Nam, J., Kim, S. and Won, D. (2005) A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices. IEEE Commun. Lett., 9, 429-431.
-
(2005)
IEEE Commun. Lett.
, vol.9
, pp. 429-431
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
24
-
-
19744369256
-
DDH-based group key agreement in a mobile environment
-
Nam, J., Kim, S. and Won, D. (2005) DDH-based group key agreement in a mobile environment. J. Syst. Software, 78, 73-83.
-
(2005)
J. Syst. Software
, vol.78
, pp. 73-83
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
25
-
-
33845682890
-
On the security of two group key agreement protocols for mobile devices
-
In Nara, Japan, May 9-12, IEEE Press, NJ
-
Tseng, Y. M. (2006) On the security of two group key agreement protocols for mobile devices. In Int Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT2006), Nara, Japan, May 9-12, pp. 59-62. IEEE Press, NJ.
-
(2006)
Int Workshop on Future Mobile and Ubiquitous Information Technologies (FMUIT2006)
, pp. 59-62
-
-
Tseng, Y.M.1
-
27
-
-
84947778144
-
The decision Diffie-Hellman problem
-
In Portland, Oregon, June 21-25, LNCS 1423, Springer-Verlag, Berlin
-
Boneh, D. (1998) The decision Diffie-Hellman problem. In Proc. 3rd Algorithmic Number Theorey Symp., Portland, Oregon, June 21-25, LNCS 1423, pp. 48-63. Springer-Verlag, Berlin.
-
(1998)
Proc. 3rd Algorithmic Number Theorey Symp.
, pp. 48-63
-
-
Boneh, D.1
-
28
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
In Konstanz, Germany, May 11-15, LNCS 1233, Springer-Verlag, Berlin
-
Shoup, V. (1997) Lower bounds for discrete logarithms and related problems. In Advances in Cryptology - Proc. Eurocrypt'97, Konstanz, Germany, May 11-15, LNCS 1233, pp. 256-266. Springer-Verlag, Berlin.
-
(1997)
Advances in Cryptology - Proc. Eurocrypt'97
, pp. 256-266
-
-
Shoup, V.1
-
29
-
-
33845610504
-
Secure Hash Standard (SHS)
-
NIST/NSA FIPS 180-2 NIST/NSA, Gaithersburg, MD, USA
-
NIST/NSA FIPS 180-2 (2005) Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
-
(2005)
-
-
-
30
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ELGamal, T. (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31, 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
ELGamal, T.1
-
31
-
-
84936033986
-
The Digital Signature Standard (DSA)
-
NIST
-
NIST (1992) The Digital Signature Standard (DSA). Commun. ACM, 35, 36-40.
-
(1992)
Commun. ACM
, vol.35
, pp. 36-40
-
-
-
32
-
-
84880883264
-
Improved on-line/off-line signature schemes
-
In Santa Barbara, CA, August 19-23, LNCS 2139, Springer-Verlag, Berlin
-
Shamir, A. and Tauman, Y. (2001) Improved on-line/off-line signature schemes. In Proc. Advances in Cryptology-Crypto'01, Santa Barbara, CA, August 19-23, LNCS 2139, pp. 355-367. Springer-Verlag, Berlin.
-
(2001)
Proc. Advances in Cryptology-Crypto'01
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
33
-
-
0004093038
-
-
(2nd edition), John Wiley & Sons, UK
-
Rankl, W., Effing, W. and Wolfgang, R. (2000) Smart Card Handbook. (2nd edition), John Wiley & Sons, UK.
-
(2000)
Smart Card Handbook
-
-
Rankl, W.1
Effing, W.2
Wolfgang, R.3
-
34
-
-
33845651723
-
-
3GPP TS 33.102 3GPP Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 6). 3GPP Technical Specification Group, Valbonne, France
-
3GPP TS 33.102 (2003) 3GPP Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 6). 3GPP Technical Specification Group, Valbonne, France.
-
(2003)
-
-
-
35
-
-
0242508595
-
EAP AKA Authentication. draft-arkko-pppext-eap-aka-11
-
The Internet Engineering Task Force (IETF), VA, USA
-
Arkko, J. and Haverinen, H. (2003) EAP AKA Authentication. draft-arkko-pppext-eap-aka-11. The Internet Engineering Task Force (IETF), VA, USA.
-
(2003)
-
-
Arkko, J.1
Haverinen, H.2
-
36
-
-
9144267125
-
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
-
Tseng, Y. M., Yang, C. C. and Su, J. H. (2004) Authentication and Billing Protocols for the Integration of WLAN and 3G Networks. Wireless Pers. Commun., 29, 351-366.
-
(2004)
Wireless Pers. Commun.
, vol.29
, pp. 351-366
-
-
Tseng, Y.M.1
Yang, C.C.2
Su, J.H.3
-
37
-
-
84907506045
-
Experiments in wireless internet security
-
In Orlando, Florida, March 17-21, IEEE Press, NJ
-
Gupta, V. and Gupta, S. (2002) Experiments in wireless internet security. In Proc. IEEE Wireless Communications and Networking Conf. (WCNC), Orlando, Florida, March 17-21, pp. 859-863. IEEE Press, NJ.
-
(2002)
Proc. IEEE Wireless Communications and Networking Conf. (WCNC)
, pp. 859-863
-
-
Gupta, V.1
Gupta, S.2
-
38
-
-
33845656812
-
-
ASUS MyPal A620 PDA. Available at
-
ASUS (2003) MyPal A620 PDA. Available at: http://www.mobiletechreview.com/asus_mypal_A620.htm.
-
(2003)
-
-
-
39
-
-
33845655946
-
-
Microsoft Pocket PC 2003., Available at
-
Microsoft (2003) Pocket PC 2003., Available at: http://www.microsoft.com/windowsmobile/default.mspx.
-
(2003)
-
-
-
40
-
-
33845616684
-
-
Ewesoft Software Development Kit (SDK). Available at
-
Ewesoft (2005) Software Development Kit (SDK). Available at: http://www.ewesoft.com/.
-
(2005)
-
-
-
41
-
-
85180529073
-
Speeding up secure web transactions using elliptic curve cryptography
-
In California, February 5-6, Internet Soceity (ISOC), VA, USA
-
Gupta, V., Stebila, D. and Fung, S. (2004) Speeding up secure web transactions using elliptic curve cryptography. In Proc. 11th Network and Distributed Systems Security Symp., California, February 5-6, pp. 231-239. Internet Soceity (ISOC), VA, USA.
-
(2004)
Proc. 11th Network and Distributed Systems Security Symp.
, pp. 231-239
-
-
Gupta, V.1
Stebila, D.2
Fung, S.3
-
42
-
-
0038443119
-
Next generation security for wireless: Elliptic curve cryptography
-
Vanstone, S. A. (2003) Next generation security for wireless: Elliptic curve cryptography. Comput. Secur., 22, 412-415.
-
(2003)
Comput. Secur.
, vol.22
, pp. 412-415
-
-
Vanstone, S.A.1
|