-
1
-
-
33244465417
-
Running Cellular/PWLAN Services: Practical Considerations for Cellular/PWLAN Architecture Supporting Interoperator Roaming
-
Feb
-
J. Leu, R. Lai, H. Lin and W. Shih, "Running Cellular/PWLAN Services: Practical Considerations for Cellular/PWLAN Architecture Supporting Interoperator Roaming," IEEE Communications Magazine, vol. 44, no. 2, pp. 73-84, Feb. 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.2
, pp. 73-84
-
-
Leu, J.1
Lai, R.2
Lin, H.3
Shih, W.4
-
2
-
-
36349035877
-
A Solution for Wireless Privacy and Payments based on E-cash
-
Athens, Greece, September
-
Y. Tsiounis, A. Kiayias and A. Karygiannis, "A Solution for Wireless Privacy and Payments based on E-cash," in IEEE SecureComm 2005, Athens, Greece, September 2005.
-
(2005)
IEEE SecureComm 2005
-
-
Tsiounis, Y.1
Kiayias, A.2
Karygiannis, A.3
-
3
-
-
84955599449
-
How to date blind signatures
-
Proc. ASIACRYPT '96, Springer-Verlag
-
M. Abe and E. Fujisaki, "How to date blind signatures," in Proc. ASIACRYPT '96, ser. LNCS, vol.1163. Springer-Verlag, 1996, pp. 244-251.
-
(1996)
ser. LNCS
, vol.1163
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
4
-
-
36348966455
-
-
M. O. Rabin, Digitized signatures and public-key functions as in-tractable as factorization, MIT Lab. Comput. Sci., Cambridge, MA, Tech. Rep. LCS/TR-212, 1979.
-
M. O. Rabin, "Digitized signatures and public-key functions as in-tractable as factorization," MIT Lab. Comput. Sci., Cambridge, MA, Tech. Rep. LCS/TR-212, 1979.
-
-
-
-
5
-
-
84887962704
-
-
S. Baek, S. Pack, T. Kwon, and Y. Choi, A Localized Authentication, Authorization, and Accounting (AAA) protocol for mobile hotspots, to apear in WONS 2006 : Third Annual Conference on Wireless On-demand Network Systems and Services, 2006.
-
S. Baek, S. Pack, T. Kwon, and Y. Choi, "A Localized Authentication, Authorization, and Accounting (AAA) protocol for mobile hotspots," to apear in WONS 2006 : Third Annual Conference on Wireless On-demand Network Systems and Services, 2006.
-
-
-
-
6
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks
-
October
-
Y. Zhang and Y. Fang, "ARSA: an attack-resilient security architecture for multi-hop wireless mesh networks," in IEEE JSAC, vol.24, no. 10, pp. 1916-1928, October 2006.
-
(2006)
IEEE JSAC
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
7
-
-
36349025674
-
A Privacy Preserving Roaming and Billing Architecture for Wireless Metropolitan Networks
-
bbcr technical report
-
H. Zhu, X. Lin, P. Ho, X. Shen and M. Shi, "A Privacy Preserving Roaming and Billing Architecture for Wireless Metropolitan Networks," bbcr technical report 2006-09.
-
(2009)
-
-
Zhu, H.1
Lin, X.2
Ho, P.3
Shen, X.4
Shi, M.5
-
8
-
-
35048860314
-
A Variation of the WTLS authentication protocol for reducing energy consumption in wireless devices
-
Toulouse, France, pp
-
P. Prasithsangaree and P. Krishnamurthy, "A Variation of the WTLS authentication protocol for reducing energy consumption in wireless devices," In Proc. of 7th IEEE HSNMC'04, Toulouse, France, pp. 696-706, 2004.
-
(2004)
Proc. of 7th IEEE HSNMC'04
, pp. 696-706
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
9
-
-
33646382089
-
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
-
March-April
-
N. R. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Tranns. on Mobile Computing, vol. 5, no. 2, pp. 128-143, March-April 2006.
-
(2006)
IEEE Tranns. on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
|