-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Steven, M, ed
-
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Steven, M. (ed.) Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 72-84 (1992)
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
38149039685
-
-
Kivinen, T., Kojo, M.: RFC3526: More Modular Exponential (MODP) DiffieHellman groups for Internet Key Exchange (IKE) (May 2003) http://www.ietf. org/rfc/rfc3526.txt
-
Kivinen, T., Kojo, M.: RFC3526: More Modular Exponential (MODP) DiffieHellman groups for Internet Key Exchange (IKE) (May 2003) http://www.ietf. org/rfc/rfc3526.txt
-
-
-
-
7
-
-
51249099680
-
Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive
-
Report 2005/424
-
Laur, S. et al.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive, Report 2005/424 (2005)
-
(2005)
-
-
Laur, S.1
-
10
-
-
33745754398
-
National Institute of Standards and Technology
-
NIST:, U.S. Department of Commerce January
-
NIST: National Institute of Standards and Technology. Digital Signature Standard (DSS). U.S. Department of Commerce (January 2000)
-
(2000)
Digital Signature Standard (DSS)
-
-
-
14
-
-
38149097247
-
Security associations in personal networks: A comparative analysis
-
Technical Report NRC-TR-2007-004, Nokia Research Center
-
Suomalainen, J. et al.: Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center (2007) http : //research. nokia. com/tr/NRC-TR-2007-004. pdf
-
(2007)
-
-
Suomalainen, J.1
-
15
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309326
-
-
Vaudenay, S.1
-
16
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
Čagalj, M., Čapkun, S., Hubaux, J.-P.: Key agreement in peer-to-peer wireless networks. In: Proceedings of the IEEE (Special Issue on Cryptography and Security), pp. 467-478 (2006)
-
(2006)
Proceedings of the IEEE (Special Issue on Cryptography and Security)
, pp. 467-478
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
17
-
-
38149045314
-
-
Wi-Fi Alliance. Wi-Fi Protected Setup Specification. Wi-Fi Alliance Document (January 2007)
-
Wi-Fi Alliance. Wi-Fi Protected Setup Specification. Wi-Fi Alliance Document (January 2007)
-
-
-
-
18
-
-
38149018109
-
-
Wireless USB Specification. Association Models Supplement. Revision 1.0. USB Implementers Forum (2006) http://www.usb.org/developers/wusb/
-
Wireless USB Specification. Association Models Supplement. Revision 1.0. USB Implementers Forum (2006) http://www.usb.org/developers/wusb/
-
-
-
|