-
1
-
-
37249056244
-
-
Härtung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of CS. Univ. of Colorado (January 2005)
-
Härtung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of CS. Univ. of Colorado (January 2005)
-
-
-
-
2
-
-
37249001562
-
802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements
-
Part 11, IEEE Press, Los Alamitos June
-
IEEE Std. 802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements, Part 11, IEEE Press, Los Alamitos (June 2004)
-
(2004)
-
-
IEEE Std1
-
3
-
-
37249039753
-
-
IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)
-
IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)
-
-
-
-
4
-
-
37249038315
-
-
IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)
-
IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)
-
-
-
-
5
-
-
37249069196
-
-
TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 February 2005
-
TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 (February 2005)
-
-
-
-
6
-
-
37249075170
-
-
TCG Mobile Trusted Module Spec, version 0.9, Revision 1, DRAFT September 2006
-
TCG Mobile Trusted Module Spec, version 0.9, Revision 1, DRAFT (September 2006)
-
-
-
-
7
-
-
37249089187
-
-
TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)
-
TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)
-
-
-
-
8
-
-
33746633133
-
Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification
-
June
-
Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification, Tech. Report RT (June 2005)
-
(2005)
Tech. Report RT
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
Monga, M.4
-
9
-
-
77951490285
-
Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base
-
ACM, New York
-
Hendricks, J., van Doom, L.: Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base. In: Proc. of the 11th ACM SIGOPS, September 2004, ACM, New York (2004)
-
(2004)
Proc. of the 11th ACM SIGOPS, September
-
-
Hendricks, J.1
van Doom, L.2
-
10
-
-
37249080941
-
Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST
-
July
-
Jansen, W., Gavrila, S., Séveillac, C., Korolev, V.: Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST, NISTIR 7206 (July 2005)
-
(2005)
NISTIR
, vol.7206
-
-
Jansen, W.1
Gavrila, S.2
Séveillac, C.3
Korolev, V.4
-
11
-
-
1542317849
-
Secure Verification of Location Claims
-
September 19, California, USA, pp
-
Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: ACM WiSE'03, September 19, 2003, California, USA, pp. 1-10 (2003)
-
(2003)
ACM WiSE'03
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
12
-
-
33745164883
-
Trusted Computing-Based Security Architecture For 4G Mobile Networks
-
Zheng, Y., He, D., Yu, W., Tang, X.: Trusted Computing-Based Security Architecture For 4G Mobile Networks. In: Proc. of PDCAT '05, pp. 251-255 (2005)
-
(2005)
Proc. of PDCAT '05
, pp. 251-255
-
-
Zheng, Y.1
He, D.2
Yu, W.3
Tang, X.4
-
14
-
-
2942625823
-
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149-153, 04
-
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149-153, 04
-
-
-
-
15
-
-
77958548111
-
Authenticating Pervasive Devices with Human Protocols
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Juels, A., Weis, A.: Authenticating Pervasive Devices with Human Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 149-153. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 149-153
-
-
Juels, A.1
Weis, A.2
-
16
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
Christianson, B, Lomas, M, eds, Security Protocols, Springer, Heidelberg
-
Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols. LNCS, vol. 1361, pp. 125-136. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
17
-
-
33644748254
-
Provably secure authenticated key exchange protocols for low power computing clients
-
Wen, H.-A., et al.: Provably secure authenticated key exchange protocols for low power computing clients. Computers & Security 25, 106-113 (2006)
-
(2006)
Computers & Security
, vol.25
, pp. 106-113
-
-
Wen, H.-A.1
|