-
1
-
-
33847249519
-
Security and privacy issues in e-passports
-
A. Juels, D. Moinar, and D. Wagner, "Security and privacy issues in e-passports," in Proc. International Conference on Security and Privacy in Communication Networks (SecureComm), 2005, pp. 74-85.
-
(2005)
Proc. International Conference on Security and Privacy in Communication Networks (SecureComm)
, pp. 74-85
-
-
Juels, A.1
Moinar, D.2
Wagner, D.3
-
2
-
-
36248986459
-
-
M. Rabin, How to exchange secrets by oblivious transfer, Aiken's Computation. Laboratory, Harvard University, Massachusetts, U.S.A., Tech. Rep. Tech. Memo TR-81, 1981.
-
M. Rabin, "How to exchange secrets by oblivious transfer," Aiken's Computation. Laboratory, Harvard University, Massachusetts, U.S.A., Tech. Rep. Tech. Memo TR-81, 1981.
-
-
-
-
4
-
-
0003153237
-
Non-interactive zero-knowledge proofs and its applications
-
M. Blum, P. Feldman, and S. Micali, "Non-interactive zero-knowledge proofs and its applications," in Proc. 20th ACM Symposium on the Theory of Computing, 1988, pp. 103-112.
-
(1988)
Proc. 20th ACM Symposium on the Theory of Computing
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
5
-
-
0024135240
-
Zero knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," J. of Cryptology, vol. I, no. 2, pp. 77-94, 1988.
-
(1988)
J. of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
7
-
-
84976295016
-
Distance-bounding protocols
-
Lecture Notes on Computer Science () Springer-Verlag
-
S. Brands and D. Chaum, "Distance-bounding protocols," in Lecture Notes on Computer Science (LNCS) Volume 765. Springer-Verlag, .1993, pp. 344-359.
-
(1993)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
9
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
S. Ganeriwal, S. Capkun, S. Han, and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proc. ACM Workshop on Wireless Security (WiSe), 2005, pp. 97-106.
-
(2005)
Proc. ACM Workshop on Wireless Security (WiSe)
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, S.3
Srivastava, M.B.4
-
10
-
-
0005599967
-
Analysis and comparison of some integer factoring algorithms
-
J. H. W. Lenstra and R. Tijdeman, Eds. Amsterdam, The Netherlands: Mathematisch Centrum
-
C. Pomerance, "Analysis and comparison of some integer factoring algorithms," in Computational Methods in Number Theory, J. H. W. Lenstra and R. Tijdeman, Eds. Amsterdam, The Netherlands: Mathematisch Centrum, 1982, pp. 89-139.
-
(1982)
Computational Methods in Number Theory
, pp. 89-139
-
-
Pomerance, C.1
-
11
-
-
84957014368
-
Discrete logarithm, in finite fields and their cryptographic significance
-
Springer-Verlag
-
A. M. Odlyzko, "Discrete logarithm, in finite fields and their cryptographic significance," in Proc Euwcrypt. Springer-Verlag, 1985, pp. 224-314.
-
(1985)
Proc Euwcrypt
, pp. 224-314
-
-
Odlyzko, A.M.1
-
12
-
-
0141980202
-
Square-root algorithms for the discrete logarithm problem
-
Walter de Gruyter
-
E. Teske, "Square-root algorithms for the discrete logarithm problem," in Public Key Cryptogmphy and Computational Number Theory. Walter de Gruyter, 2001, pp. 283-301.
-
(2001)
Public Key Cryptogmphy and Computational Number Theory
, pp. 283-301
-
-
Teske, E.1
-
14
-
-
0018997051
-
Introduction to spread-spectrum antimultipath techniques and their application to urban digital radio
-
Mar
-
G. L. Turin, "Introduction to spread-spectrum antimultipath techniques and their application to urban digital radio," Proc. IEEE, vol. 68, no. 3, pp. 328-353, Mar. 1980.
-
(1980)
Proc. IEEE
, vol.68
, Issue.3
, pp. 328-353
-
-
Turin, G.L.1
-
16
-
-
0028516581
-
Estimation of frequency-delay of arrival (FDOA) using fourth-order statistics in unknown correlated gaussian noise sources
-
Oct
-
D. C. Shin and C. L. Nikias, "Estimation of frequency-delay of arrival (FDOA) using fourth-order statistics in unknown correlated gaussian noise sources," IEEE Trans. Signal Processing, vol. 42, no. 10, pp. 2771-2780, Oct. 1994.
-
(1994)
IEEE Trans. Signal Processing
, vol.42
, Issue.10
, pp. 2771-2780
-
-
Shin, D.C.1
Nikias, C.L.2
-
17
-
-
85019630743
-
An efficient algorithm for joint estimation of differential time delays and frequency offsets
-
A. R. Naghsh-Nilchi and V. J. Mathews, "An efficient algorithm for joint estimation of differential time delays and frequency offsets," in Proc. IEEE Inter-national Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1992, pp. V309-V312.
-
(1992)
Proc. IEEE Inter-national Conference on Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Naghsh-Nilchi, A.R.1
Mathews, V.J.2
-
18
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
A. Savvides, C. Han, and M. Srivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proc. ACM International Conference on Mobile Computing and Networking (MobiCom), 2001, pp. 166-179.
-
(2001)
Proc. ACM International Conference on Mobile Computing and Networking (MobiCom)
, pp. 166-179
-
-
Savvides, A.1
Han, C.2
Srivastava, M.3
-
19
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
D. Liu, P. Ning, and W. K. Du, "Attack-resistant location estimation in sensor networks," in Proc. ACM/IEEE International Symposium on Information Processing in Sensor Networks (IPSN), 2005, pp. 99-106.
-
(2005)
Proc. ACM/IEEE International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
20
-
-
33144454801
-
Secure positioning in wireless networks
-
Feb
-
S. Capkun and J. P. Hubaux, "Secure positioning in wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221-232, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.P.2
-
22
-
-
84858462584
-
-
emulation development kit. ARM Limited, Inc, Online, Available
-
(2005) ARM Secure SC200, smart card emulation development kit. ARM Limited, Inc. [Online]. Available: http://www.arm.com/
-
ARM Secure SC200, smart card
-
-
-
24
-
-
36248973942
-
-
ANSI X9.63, public key cryptography for the financial services industry: The elliptic curve key agreement and key transport protocols. National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov
-
(2001) ANSI X9.63, public key cryptography for the financial services industry: The elliptic curve key agreement and key transport protocols. National Institute of Standards and Technology. [Online]. Available: http://csrc.nist.gov
-
-
-
-
25
-
-
0010029876
-
Efficient arithmetic on koblitz curves
-
Mar
-
J. A. Solinas, "Efficient arithmetic on koblitz curves," Designs, Codes and Cryptography, vol. 19, no. 2, pp. 195-249, Mar. 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2
, pp. 195-249
-
-
Solinas, J.A.1
-
26
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
Springer-Verlag
-
D. Hankerson, J. L. Hernandez, and A. Menezes, "Software implementation of elliptic curve cryptography over binary fields," in Proc. Cryptographic Hardware and Embedded Systems (CHES), LNCS Volume 1965. Springer-Verlag, 2000, pp. 1-24.
-
(2000)
Proc. Cryptographic Hardware and Embedded Systems (CHES), LNCS
, vol.1965
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
27
-
-
36248966814
-
-
W. J. Dixon, Analysis of extreme values, Annals of Mathematical Statistics, 2.1, pp. 488-506, 1950.
-
W. J. Dixon, "Analysis of extreme values," Annals of Mathematical Statistics, vol. 2.1, pp. 488-506, 1950.
-
-
-
-
29
-
-
0002344794
-
Bootstrap methods: Another look at the jackknife
-
B. Efron, "Bootstrap methods: Another look at the jackknife," Annals of Statistics, vol. 7, pp. .1-26, 1979.
-
(1979)
Annals of Statistics
, vol.7
, pp. 1-26
-
-
Efron, B.1
-
31
-
-
84946031884
-
Procedures for detecting outlying observations in samples
-
F. Grubbs, "Procedures for detecting outlying observations in samples," Technometrics, vol. 11, no. 1, pp. 1-21, 1969.
-
(1969)
Technometrics
, vol.11
, Issue.1
, pp. 1-21
-
-
Grubbs, F.1
|