-
3
-
-
84956983370
-
Open Key Exchange: How to defeat dictionary attacks without encrypting public Keys
-
Ecole Normale Suprieure, Paris
-
S. Lucks, "Open Key Exchange: How to defeat dictionary attacks without encrypting public Keys". In Security Protocol Workshop '97, Ecole Normale Suprieure, Paris, 1992.
-
(1992)
Security Protocol Workshop '97
-
-
Lucks, S.1
-
5
-
-
85180527787
-
The secure remote password protocol
-
San Diego, California, Internet Society
-
T. Wu, "The secure remote password protocol". In Symposium on Network and Distributed Systems Security (NDSS '98), pages 97-111, San Diego, California, 1998. Internet Society.
-
(1998)
Symposium on Network and Distributed Systems Security (NDSS '98)
, pp. 97-111
-
-
Wu, T.1
-
7
-
-
2642554455
-
-
Technical Report EPFL/IC/200234, Swiss Federal Institute of Technology, Lausanne, June
-
S. Capkun, L. Buttyan, J.-P. Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc Networks". Technical Report EPFL/IC/200234, Swiss Federal Institute of Technology, Lausanne, June 2002.
-
(2002)
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
9
-
-
3042629977
-
-
Technical Report UIUCDCS-R-2002-2290/UILU-ENG-2002-1734, University of Illinois at Urbana-Champaign, July
-
S. Yi, R. Kravets, "Key Management for Heterogeneous Ad Hoc Wireless Networks". Technical Report UIUCDCS-R-2002-2290/UILU-ENG-2002-1734, University of Illinois at Urbana-Champaign, July 2002.
-
(2002)
Key Management for Heterogeneous Ad Hoc Wireless Networks
-
-
Yi, S.1
Kravets, R.2
-
10
-
-
0003515999
-
-
Technical Report, Cornell University, 2000. Revised
-
L. Zhou, F. Schneider, R. van Renesse, "COCA: A Secure Distributed On-line Certification Authority". Technical Report, Cornell University, 2000. Revised, 2002.
-
(2002)
COCA: A Secure Distributed On-line Certification Authority
-
-
Zhou, L.1
Schneider, F.2
Van Renesse, R.3
-
12
-
-
0035009259
-
A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks
-
S. Banerjee, S. Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks" In Proc. of IEEE INFOCOM, pages 1028-1037, 2001.
-
(2001)
Proc. of IEEE INFOCOM
, pp. 1028-1037
-
-
Banerjee, S.1
Khuller, S.2
-
13
-
-
0031234161
-
Adaptive Clustering for Mobile Wireless Networks
-
C.R. Lin, M. Gerla, "Adaptive Clustering for Mobile Wireless Networks", IEEE Journal of Selected Areas in Communications, vol. 15, no. 7, pages 1265-1275, 1997.
-
(1997)
IEEE Journal of Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1265-1275
-
-
Lin, C.R.1
Gerla, M.2
-
14
-
-
0031126049
-
A cluster-based approach for routing in dynamic networks
-
April
-
P. Krishna, N. Vaidya, M. Chatterjee, D. Pradhan "A cluster-based approach for routing in dynamic networks", Proc. of ACM SIGCOMM Computer Communication, pages 49-65, April 1997.
-
(1997)
Proc. of ACM SIGCOMM Computer Communication
, pp. 49-65
-
-
Krishna, P.1
Vaidya, N.2
Chatterjee, M.3
Pradhan, D.4
-
15
-
-
84957626176
-
Proactive Secret Sharing or: How to Cope with Perpetual Leakage
-
D. Coppersmith, editor, Proc. of CRYPTO'95
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage". In D. Coppersmith, editor, Proc. of CRYPTO'95, volume 963 of LNCS, pages 339-352, 1995.
-
(1995)
LNCS
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
16
-
-
0010316932
-
-
Master's Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA, September
-
S. Jarecki , "Proactive Secret Sharing and Public Key Cryptosystems", Master's Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA, September 1995.
-
(1995)
Proactive Secret Sharing and Public Key Cryptosystems
-
-
Jarecki, S.1
-
17
-
-
11244267013
-
-
Springer-Verlag, New York
-
D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag, New York, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
18
-
-
85023809951
-
Threshold cryptosystems. Advances in Cryptology
-
CRYPTO
-
Y. Desmedt, Y. Frankel, "Threshold cryptosystems. Advances in Cryptology"- CRYPTO, LNCS 435:307-315, 1990.
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
19
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
P. Feldman, "A practical scheme for non-interactive verifiable secret sharing". In Proc. of IEEE Fund. Of Comp., Sci., pages 427-437, 1987.
-
(1987)
Proc. of IEEE Fund. of Comp., Sci.
, pp. 427-437
-
-
Feldman, P.1
|