-
4
-
-
84874324906
-
Identity-based Encryption from the Weil Pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
35248874429
-
Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identitybased Cryptography
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Boyen, X.: Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identitybased Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 382-398. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 382-398
-
-
Boyen, X.1
-
8
-
-
0032649638
-
The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems
-
Frey, G., Muller, M., Ruck, H.: The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory 45, 1717-1718 (1999)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 1717-1718
-
-
Frey, G.1
Muller, M.2
Ruck, H.3
-
9
-
-
49049089688
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295-310. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
10
-
-
38049003964
-
A Survey of Key Management in Ad Hoc Networks
-
3rd Quarter, pp
-
Hegland, A.M, Winjum, E., Mjolsnes, S.F, Rong, C., Kure, O., Spilling, P.: A Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorial, 3rd Quarter, pp. 48-66 (2006)
-
(2006)
IEEE Communications Surveys and Tutorial
, pp. 48-66
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
11
-
-
38049059718
-
-
IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)
-
IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)
-
-
-
-
12
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0027662341
-
Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field
-
Menezes, A., Okamoto, T., Vanstone, S.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Theory 39, 1639-1646 (1993)
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
14
-
-
38049061991
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, http://www.nist.gov
-
-
-
-
15
-
-
38049034242
-
ZigBee Security Specification Overview
-
Hong Kong
-
Reddy, J.: ZigBee Security Specification Overview. ZigBee Open House presentation, Hong Kong (2005)
-
(2005)
ZigBee Open House presentation
-
-
Reddy, J.1
-
16
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
20
-
-
33750089718
-
-
Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, 4158, pp. 521-530. Springer, Heidelberg (2006)
-
Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 521-530. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
38049077789
-
-
Alliance
-
ZigBee Alliance, http://www.zigbee.org
-
-
-
ZigBee1
-
23
-
-
38049028976
-
-
ZigBee Alliance. ZigBee Specification 1.1 (2005)
-
ZigBee Alliance. ZigBee Specification 1.1 (2005)
-
-
-
|