메뉴 건너뛰기




Volumn 6, Issue 4, 2007, Pages 31-39

Multichannel security protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTIC CHANNEL; DIFFIE-HELLMAN EXCHANGE COMPONENTS; EAVESDROPPING ATTACKS;

EID: 35348851489     PISSN: 15361268     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPRV.2007.76     Document Type: Article
Times cited : (33)

References (6)
  • 1
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling-Security Issues for Ad Hoc Wireless Networks
    • Springer
    • F. Stajano and R. Anderson, "The Resurrecting Duckling-Security Issues for Ad Hoc Wireless Networks," Proc. Security Protocols Workshop, LNCS1796, Springer, 1999, pp. 172-182.
    • (1999) Proc. Security Protocols Workshop, LNCS1796 , pp. 172-182
    • Stajano, F.1    Anderson, R.2
  • 2
    • 35348901121 scopus 로고    scopus 로고
    • Multi-Channel Protocols
    • Proc. 13th Int'l Workshop Security Protocols, Springer
    • F.-L. Wong and F. Stajano, "Multi-Channel Protocols," Proc. 13th Int'l Workshop Security Protocols, LNCS 4631, Springer, 2005.
    • (2005) LNCS , vol.4631
    • Wong, F.-L.1    Stajano, F.2
  • 3
    • 84976653144 scopus 로고
    • Some Computer Science Issues in Ubiquitous Computing
    • M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Comm. ACM, vol. 36, no. 3, 1993, pp. 75-84.
    • (1993) Comm. ACM , vol.36 , Issue.3 , pp. 75-84
    • Weiser, M.1
  • 5
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198-208.
    • (1983) IEEE Trans. Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 6
    • 84885941616 scopus 로고    scopus 로고
    • Efficient Mutual Data Authentication Using Manually Authenticated Strings
    • Proc. 5th Int'l Conf. Cryptology and Network Security CANS 06, Springer
    • S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90-107.
    • (2006) LNCS , vol.4301 , pp. 90-107
    • Laur, S.1    Nyberg, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.