-
1
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. J. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.2
Vanstone, S.3
-
3
-
-
12444337118
-
-
2nd edn. Addison-Wesley, Reading, MA
-
C. Adams and S. Lloyd. Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edn. Addison-Wesley, Reading, MA, 2003.
-
(2003)
Understanding PKI: Concepts, Standards and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
5
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Springer-Verlag, Berlin, April
-
R. J. Anderson and M. G. Kuhn. Low cost attacks on tamper resistant devices. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, eds, Proceedings of the 5th International Workshop on Security Protocols, LNCS 1361, pp. 125-136. Springer-Verlag, Berlin, April 1997.
-
(1997)
Proceedings of the 5th International Workshop on Security Protocols, LNCS 1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
6
-
-
0035475290
-
API level attacks on embedded systems
-
October
-
M. Bond and R. J. Anderson. API level attacks on embedded systems. IEEE Computer Magazine, 34(10):67-75, October 2001.
-
(2001)
IEEE Computer Magazine
, vol.34
, Issue.10
, pp. 67-75
-
-
Bond, M.1
Anderson, R.J.2
-
10
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. van Oorschot, and M.Wiener. Authentication and authenticated key exchange. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
12
-
-
33646048509
-
The personal PKI
-
C. J. Mitchell, ed, The Institute of Electrical Engineers, London
-
C. J. Mitchell and R. Schaffelhofer. The personal PKI. In C. J. Mitchell, ed., Security for Mobility, pp. 35-61. The Institute of Electrical Engineers, London, 2004.
-
(2004)
Security for Mobility
, pp. 35-61
-
-
Mitchell, C.J.1
Schaffelhofer, R.2
-
15
-
-
0004115865
-
-
Internet Engineering Task Force, June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. RFC 2560, X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol - OCSP. Internet Engineering Task Force, June 1999.
-
(1999)
RFC 2560, X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
17
-
-
0008144151
-
-
Technical Report UCLA-CSD-TR-200030, Computer Science Department, University of California, Los Angeles, October
-
H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks. Technical Report UCLA-CSD-TR-200030, Computer Science Department, University of California, Los Angeles, October 2000.
-
(2000)
Ubiquitous and robust authentication services for ad hoc wireless networks
-
-
Luo, H.1
Lu, S.2
-
18
-
-
1342306709
-
Security for cluster based ad hoc networks
-
V.Varadharajan, R. Shankaran, and M. Hitchens. Security for cluster based ad hoc networks. Computer Communications, 27(5):488-501, 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.5
, pp. 488-501
-
-
Varadharajan, V.1
Shankaran, R.2
Hitchens, M.3
-
19
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
20
-
-
35048844178
-
Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography
-
S. K. Katsikas, S. Gritzalis, and J. Lopez, eds, Springer-Verlag, Berlin
-
C. Zouridaki, B. L. Mark, K. Gaj, and R. K. Thomas. Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography. In S. K. Katsikas, S. Gritzalis, and J. Lopez, eds, Proceeding of Public Key Infrastructure, First European PKI Workshop: Research and Application, EuroPKI 2004, Samos Island, Greece, June 25-26, Volume 3093 of Lecture Notes in Computer Science, pp. 232-245. Springer-Verlag, Berlin, 2004.
-
(2004)
Proceeding of Public Key Infrastructure, First European PKI Workshop: Research and Application, EuroPKI 2004, Samos Island, Greece, June 25-26, Volume 3093 of Lecture Notes in Computer Science
, pp. 232-245
-
-
Zouridaki, C.1
Mark, B.L.2
Gaj, K.3
Thomas, R.K.4
-
23
-
-
85013601581
-
-
Web Services Security X.509 Certificate Token Profile, OASIS Standard 200401, March
-
Web Services Security X.509 Certificate Token Profile. OASIS Standard 200401, March 2004. http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0.
-
(2004)
-
-
-
24
-
-
85013569103
-
-
http://www.bacstel-ip.com/.
-
-
-
-
25
-
-
0036684150
-
PKI: It’s not dead, just resting
-
P. Gutmann. PKI: it’s not dead, just resting. IEEE Computer, 35(8):41-49, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
|