-
1
-
-
0034317075
-
Key agreement in ad-hoc networks
-
November
-
N. Asokan et al; "Key agreement in ad-hoc networks," Computer Communications, 23(17):1627-1637, November 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
-
2
-
-
33846944919
-
-
Phil Agre; The architecture of identity: Embedding privacy in market institutions, Information, Communication and Society 2(1), 1999, pp 1-25. Also available at http://polaris.gseis.ucla.edu/pagre/ architecture.html. See also a posting to the Red Rock Eater mailing list available at http://groups.yahoo.com/group/rre/message/1318, August 2000.
-
Phil Agre; "The architecture of identity: Embedding privacy in market institutions", Information, Communication and Society 2(1), 1999, pp 1-25. Also available at http://polaris.gseis.ucla.edu/pagre/ architecture.html. See also a posting to the Red Rock Eater mailing list available at http://groups.yahoo.com/group/rre/message/1318, August 2000.
-
-
-
-
4
-
-
33846979000
-
Generic Authentication Architecture (GAA); Generic bootstrapping architecture
-
available from, March
-
3GPP TS 33.220; "Generic Authentication Architecture (GAA); Generic bootstrapping architecture", available from http://www.3gpp.org/ ftp/Specs/html-info/33220.htm, March 2005
-
(2005)
3GPP TS 33.220
-
-
-
5
-
-
33846951038
-
Generic Authentication Architecture (GAA); System Description
-
available from, March
-
3GPP TR 33.919; "Generic Authentication Architecture (GAA); System Description", available from http://www.3gpp.org/ftp/Specs/html- info/33919.htm, March 2005.
-
(2005)
3GPP TR 33.919
-
-
-
6
-
-
33846956366
-
-
Aki Niemi et al; Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA), Internet Engineering Task Force, RFC 3310, available at http://www.ietf.org/rfc/ rfc3310.txt, September 2002.
-
Aki Niemi et al; "Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA)", Internet Engineering Task Force, RFC 3310, available at http://www.ietf.org/rfc/ rfc3310.txt, September 2002.
-
-
-
-
7
-
-
33846942863
-
Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
-
available at, June
-
Pasi Eronen et al; "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)", Interenet Engineering Task Force, Internet Draft, available at http://www.ietf.org/internet-drafts-ieft-tls-psk-09. txt, June 2005.
-
(2005)
Interenet Engineering Task Force, Internet Draft
-
-
Eronen, P.1
-
8
-
-
33846979358
-
-
John Franks et al; HTTP Authentication: Basic and Digest Access Authentication, Internet Engineering Task Force, RFC 2617, available at http://www.ietf.org/rfc/rfc2617.txt, June 1999.
-
John Franks et al; "HTTP Authentication: Basic and Digest Access Authentication", Internet Engineering Task Force, RFC 2617, available at http://www.ietf.org/rfc/rfc2617.txt, June 1999.
-
-
-
-
9
-
-
33846972896
-
-
3GPP TS 33.221; Generic Authentication Architecture (GAA); Support for subscriber certificates, available from http://www.3gpp. org/ftp/Specs/html-info/33221.htm. December 2004.
-
3GPP TS 33.221; "Generic Authentication Architecture (GAA); Support for subscriber certificates", available from http://www.3gpp. org/ftp/Specs/html-info/33221.htm. December 2004.
-
-
-
-
10
-
-
4944267395
-
Internet Key Exchange (IKEv2) Protocol
-
Charlie Kaufman Editor, available at, September
-
Charlie Kaufman (Editor); "Internet Key Exchange (IKEv2) Protocol", Internet Engineering Task Force, Internet Draft, available at http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-17. txt, September 2004.
-
(2004)
Internet Engineering Task Force, Internet Draft
-
-
-
11
-
-
33645672701
-
Man-in-the-middle in Tunnelled Authentication protocols
-
th International Workshop on Security Protocols, available at, April
-
th International Workshop on Security Protocols, Springer LNCS 3364, pp28-42, available at http://www.saunalahti.fi/~asokan/research/mitm.html. April 2003.
-
(2003)
Springer LNCS
, vol.3364
, pp. 28-42
-
-
Asokan, N.1
-
12
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks
-
th International Workshop on Security Protocols, April
-
th International Workshop on Security Protocols, LNCS 1796, April 1999.
-
(1999)
LNCS
, vol.1796
-
-
Stajano, F.1
-
13
-
-
3042662152
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
February 6-8; San Diego; CA; USA
-
Dirk Balfanz et al; "Talking to strangers: authentication in ad-hoc wireless networks" in Proc. Network and Distributed System Security Symposium; 2002 February 6-8; San Diego; CA; USA.
-
(2002)
Proc. Network and Distributed System Security Symposium
-
-
Balfanz, D.1
-
14
-
-
33846941810
-
-
Jonathan McCune et al; Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication, (to appear) in the Proc. of the IEEE Symposium of Security and Privacy, May 2005, available at http://sparrow.ece.cmu.edu%7Eadrian/projects/sib.pdf
-
Jonathan McCune et al; Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication, (to appear) in the Proc. of the IEEE Symposium of Security and Privacy, May 2005, available at http://sparrow.ece.cmu.edu%7Eadrian/projects/sib.pdf
-
-
-
-
16
-
-
33846317975
-
Easy and Secure Setup of Personal Wireless Networks
-
November, available at
-
Amol Kulkarni et al; "Easy and Secure Setup of Personal Wireless Networks", Technology@Intel Magazine, November 2004, available at http://www.intel.com/technology/magazine/communications/wi11042. pdf
-
(2004)
Technology@Intel Magazine
-
-
Kulkarni, A.1
-
18
-
-
85084164692
-
SSH - Secure Login Connections over the Internet
-
Tatu Ylönen; "SSH - Secure Login Connections over the Internet," Proc. Sixth Usenix Security Symposium, pp 37-42, 1996
-
(1996)
Proc. Sixth Usenix Security Symposium
, pp. 37-42
-
-
Ylönen, T.1
-
19
-
-
0001126172
-
Pricing via Processing or Combating Junk Mail
-
Cynthia Dwork et al; "Pricing via Processing or Combating Junk Mail", Advances in Cryptology, CRYPTO'92, 1992
-
(1992)
Advances in Cryptology, CRYPTO'92
-
-
Dwork, C.1
-
20
-
-
44349087977
-
Hashcash - Amortizable Publicly Auditable Cost-Functions
-
Tech Report, available at
-
Adam Back; "Hashcash - Amortizable Publicly Auditable Cost-Functions", Tech Report, available at http://www.hashcash. org/papers/, 2002
-
(2002)
-
-
Back, A.1
-
22
-
-
35248835679
-
On Memory-Bound Functions for Fighting Spam
-
CRYPTO 2003, Available from
-
Cynthia Dwork et al; "On Memory-Bound Functions for Fighting Spam", CRYPTO 2003, LNCS 2729. Available from http://research. microsoll.com/research/pubs/view.aspx?type=Publicatio n&id-1094, 2003.
-
(2003)
LNCS
, vol.2729
-
-
Dwork, C.1
-
23
-
-
33846955664
-
-
Ben Laurie et al; Proof-of-Work proves not to work, WEAS 04, available from http://www.hashcash.org/papers/proof-work.pdf. 2004.
-
Ben Laurie et al; "Proof-of-Work proves not to work", WEAS 04, available from http://www.hashcash.org/papers/proof-work.pdf. 2004.
-
-
-
-
24
-
-
33644499772
-
-
Seamus Moloney; Simulation of a distributed recommendation system for pervasive networks, Proc. 20th Annual ACM Symposium on Applied Computing TRECK track, Santa Fe, New Mexico, March 13 17, 2005
-
Seamus Moloney; "Simulation of a distributed recommendation system for pervasive networks", Proc. 20th Annual ACM Symposium on Applied Computing TRECK track, Santa Fe, New Mexico, March 13 17, 2005
-
-
-
|