-
1
-
-
35048827965
-
Ticket-based access scheme for mobile users
-
Conferences in Research and Practice in Information Technology
-
H. Wang, J. Cao and Y. Zhang, Ticket-based access scheme for mobile users, Twenty-Fifth Australian Computer Science Conference (ACSC2002), Conferences in Research and Practice in Information Technology, Vol. 4, 2002.
-
(2002)
Twenty-Fifth Australian Computer Science Conference (ACSC2002)
, vol.4
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
2
-
-
34548157765
-
Ticket based Authentication and Payment Protocol for Mobile Telecommunications Systems
-
B.-R. Lee, T.-Y. Kim, S.-S. Kang, Ticket based Authentication and Payment Protocol for Mobile Telecommunications Systems, IEEE Computer Society, prdc, p.218, 2001.
-
(2001)
IEEE Computer Society, prdc
, pp. 218
-
-
Lee, B.-R.1
Kim, T.-Y.2
Kang, S.-S.3
-
3
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport, Password Authentication with Insecure Communication, Communications of the ACM, Vol. 24(11), pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
34548156014
-
-
T. Rodden, A. Friday, H. Mller, A. Dix, A Leightweight Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol, 2002.
-
T. Rodden, A. Friday, H. Mller, A. Dix, A Leightweight Approach to Managing Privacy in Location-Based Services, Technical Report Equator-02-058, University of Nottingham and Lancaster University and University of Bristol, 2002.
-
-
-
-
5
-
-
0033313663
-
Accountable Anonymous Access to Services in Mobile Communication Systems
-
L. Buttyn, J.-P. Hubaux, Accountable Anonymous Access to Services in Mobile Communication Systems, IEEE Computer Science, srds, p. 384, 1999.
-
(1999)
IEEE Computer Science, srds
, pp. 384
-
-
Buttyn, L.1
Hubaux, J.-P.2
-
8
-
-
34548177529
-
-
San Diego, CA
-
A. Mitseva, M. Gerlach, C. Rek, N.R. Prasad, Context-Aware Adaptive Privacy Protection for Wireless Sensor Networks, WPMC 2006, San Diego, CA, 2006
-
(2006)
Context-Aware Adaptive Privacy Protection for Wireless Sensor Networks, WPMC 2006
-
-
Mitseva, A.1
Gerlach, M.2
Rek, C.3
Prasad, N.R.4
-
11
-
-
79953067606
-
Secure hash standards (SHS)
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, Secure hash standards (SHS), Federal Information Processing Standards Publication 180-2, 2002.
-
(2002)
Federal Information Processing Standards Publication
, vol.180 -2
-
-
-
12
-
-
27544477491
-
-
I.A. Junglas, C. Spitzmller, A Research Model for Studying Privacy Concerns Pertaining to LocationBased Services, Proceedings of the 38th Hawaii International Conference on System Sciences, HICSS05, Jan, 2005.
-
I.A. Junglas, C. Spitzmller, A Research Model for Studying Privacy Concerns Pertaining to LocationBased Services, Proceedings of the 38th Hawaii International Conference on System Sciences, HICSS05, Jan, 2005.
-
-
-
-
14
-
-
19944425657
-
-
URL
-
X. Wang, X. Lai, M. Daum, Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004, URL: http://eprint.iacr.Org/2004/199.pdf
-
(2004)
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
-
-
Wang, X.1
Lai, X.2
Daum, M.3
-
16
-
-
34548182325
-
-
Network of Excellence in Cryptology, Recent Collision Attacks on Hash Functions: ECRYPT Position Paper. Revision 1.1, 17 February 2005, URL: http://www.ecrypt.eu.org/documents/STVL-ERICS-2-HASH_STMT-1.1.pdf
-
Network of Excellence in Cryptology, "Recent Collision Attacks on Hash Functions: ECRYPT Position Paper". Revision 1.1, 17 February 2005, URL: http://www.ecrypt.eu.org/documents/STVL-ERICS-2-HASH_STMT-1.1.pdf
-
-
-
|