-
1
-
-
24644434353
-
Security in personal area networks
-
London
-
Gehrmann, C., and Nyberg, K.: ' Security in personal area networks ', Security for Mobility, IEE, London, 2004, p. 191-230
-
(2004)
Security for Mobility, IEE
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
2
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann, C., Mitchell, C.J., and Nyberg, K.: ' Manual authentication for wireless devices ', RSA Cryptobytes, 2004, 7, (1), p. 29-37
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
3
-
-
0001831930
-
The resurrecting duckling: Security issues for ad hoc wireless networks
-
Christianson B. Crispo B. Roe M. Lecture Notes in Computer Science
-
Stajano, F., and Anderson, R.: Christianson, B., Crispo, B., Roe, M., ' The resurrecting duckling: Security issues for ad hoc wireless networks ', Security protocols, 7th Int. Workshop Proceedings, 1999, Lecture Notes in Computer Science
-
(1999)
Security Protocols, 7th Int. Workshop Proceedings
-
-
Stajano, F.1
Anderson, R.2
-
4
-
-
33751044073
-
Talking to strangers: Authentication in ad hoc wireless networks
-
San Diego, CA, February
-
Balfanz, D., Smetters, D.K., Stewart, P., and Wong, H.C.: ' Talking to strangers: authentication in ad hoc wireless networks ', Network and Distributed System Security Symposium, San Diego, CA, February, 2002
-
(2002)
Network and Distributed System Security Symposium
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
5
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated string
-
ShouV. Santa Barbara, CA, August Springer
-
Vaudenay, S.: Shoup, V., ' Secure communications over insecure channels based on short authenticated string ', Advances in Cryptography, Lecture Notes in Computer Science, Santa Barbara, CA, August, 2005, Springer, 3621, p. 309-326
-
(2005)
Advances in Cryptography, Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
6
-
-
33745637238
-
An optimal non-interactive message authentication protocol
-
Pointcheval D. San Jose, CA, February Springer Lecture Notes in Computer Science
-
Pasini, S., and Vaudenay, S.: Pointcheval, D., ' An optimal non-interactive message authentication protocol ', Topics in Cryptography, San Jose, CA, February, 2006, Springer, 3860, p. 280-294, Lecture Notes in Computer Science
-
(2006)
Topics in Cryptography
, vol.3860
, pp. 280-294
-
-
Pasini, S.1
Vaudenay, S.2
-
7
-
-
0025056443
-
A discrete logarithm implementation of perfect zeroknowledge blobs
-
0933-2790
-
Boyar, J.F., and Kurtz, S.A.: ' A discrete logarithm implementation of perfect zeroknowledge blobs ', J. Cryptol., 1990, 2, (2), p. 63-76 0933-2790
-
(1990)
J. Cryptol.
, vol.2
, Issue.2
, pp. 63-76
-
-
Boyar, J.F.1
Kurtz, S.A.2
-
8
-
-
0035751083
-
Paillier's cryptosystem revisited
-
Philadelphia, PA ACM Press
-
Catalano, D., Gennaro, R., Howgrave-Graham, N., and Nguyen, P.Q.: ' Paillier's cryptosystem revisited ', CCS 2001: Proc. 8th ACM Conf. Computer and Communications Security, Philadelphia, PA, 2001, ACM Press, p. 206-214
-
(2001)
CCS 2001: Proc. 8th ACM Conf. Computer and Communications Security
, pp. 206-214
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.Q.4
-
9
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern J. Prague, Czech Republic, May Springer Lecture Notes in Computer Science
-
Paillier, P.: Stern, J., ' Public-key cryptosystems based on composite degree residuosity classes ', 'Advances in Cryptology-EUROCRYPT '99: Int. Conf. Theory and Application of Cryptographic Techniques', Prague, Czech Republic, May, 1999, Springer, 1592, p. 223-238, Lecture Notes in Computer Science
-
(1999)
'Advances in Cryptology-EUROCRYPT '99: Int. Conf. Theory and Application of Cryptographic Techniques'
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
10
-
-
33749546005
-
Tight bounds for unconditional authentication protocols in the manual channel and shared key models
-
Naor, M., Segev, G., and Smith, A.: ' Tight bounds for unconditional authentication protocols in the manual channel and shared key models ', Advances in Cryptology - CRYPTO '06, 2006, p. 214-231
-
(2006)
Advances in Cryptology - CRYPTO '06
, pp. 214-231
-
-
Naor, M.1
Segev, G.2
Smith, A.3
-
11
-
-
34648873168
-
-
Technical Report 02 University of Waterloo, Centre for Applied Cryptographic Research (CACR), Canada, 2007
-
' Interactive two-channel message authentication based on interactive-collision resistant hash functions ', Technical Report, 02, University of Waterloo, Centre for Applied Cryptographic Research (CACR), Canada, 2007
-
-
-
|