-
3
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. Advances in Cryptology - Crypto'02, pp.354-368, 2002.
-
(2002)
Proc. Advances in Cryptology - Crypto'02
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
4
-
-
11244321843
-
Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs
-
M.S. Bargh, B. Hulsebosch, H. Eertink, A.R. Prasad, P. Schoo and H. Wang, "Fast Authentication Methods for Handovers between IEEE 802.11 Wireless LANs," Proc. ACM WMASH, 2004.
-
(2004)
Proc. ACM WMASH
-
-
Bargh, M.S.1
Hulsebosch, B.2
Eertink, H.3
Prasad, A.R.4
Schoo, P.5
Wang, H.6
-
6
-
-
24944537182
-
Identity-BasedEncryption: A Survey
-
M. Gagné, "Identity-BasedEncryption: a Survey," CryptoBytes, vol.6, no.1, pp.10-19, 2003.
-
(2003)
CryptoBytes
, vol.6
, Issue.1
, pp. 10-19
-
-
Gagné, M.1
-
9
-
-
27244436453
-
-
P. Grabher, D. Page, Hardware acceleration of the Tate pairing in characteristic 3, Cryptographic Hardware and Embedded Systems (CHES), 3659 of LNCS, Springer, 2005, pp. 398-411.
-
P. Grabher, D. Page, "Hardware acceleration of the Tate pairing in characteristic 3", Cryptographic Hardware and Embedded Systems (CHES), vol. 3659 of LNCS, Springer, 2005, pp. 398-411.
-
-
-
-
10
-
-
38549090717
-
-
IEEE Std 802.11i, Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. Amendment 6: medium access control (MAC) security enhancements, July 2004.
-
IEEE Std 802.11i, Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications. Amendment 6: medium access control (MAC) security enhancements, July 2004.
-
-
-
-
11
-
-
38549151856
-
-
IEEE Std 802.1X, Port-Based Network Access Control, 2004.
-
IEEE Std 802.1X, Port-Based Network Access Control, 2004.
-
-
-
-
12
-
-
38549151327
-
-
IEEE 802.11 Task Group R, http://grouper.ieee.org/groups/802/11/Reports/ tgr_update.htm.
-
IEEE 802.11 Task Group R
-
-
-
13
-
-
38549110211
-
-
International Telecommunication Union, .General Characteristics of International Telephone Connections and International Telephone Circuits. ITU-TG.114, 1988.
-
International Telecommunication Union, .General Characteristics of International Telephone Connections and International Telephone Circuits. ITU-TG.114, 1988.
-
-
-
-
15
-
-
27244434197
-
-
T. Kerins, W. Marnane, E. Popovici, P. Barreto, Efficient hardware for the Tate pairing calculation in characteristic 3, Cryptographic Hardware and Embedded Systems (CHES), 3659 of LNCS, Springer, 2005, pp. 412-426.
-
T. Kerins, W. Marnane, E. Popovici, P. Barreto, "Efficient hardware for the Tate pairing calculation in characteristic 3", Cryptographic Hardware and Embedded Systems (CHES), vol. 3659 of LNCS, Springer, 2005, pp. 412-426.
-
-
-
-
16
-
-
8344271253
-
Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network
-
Hong Kong, Mar
-
A. Mishra, M.H. Shin and W. A. Arbaugh, "Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network," Proc. of IEEE INFOCOM'04, Hong Kong, Mar. 2004.
-
(2004)
Proc. of IEEE INFOCOM'04
-
-
Mishra, A.1
Shin, M.H.2
Arbaugh, W.A.3
-
17
-
-
1842665111
-
Proactive Key Distribution using Neighbor Graphs
-
Feb
-
A. Mishra, M. Shin, NX. Petroni Jr., T.C. Clancy and W. Arbaugh, "Proactive Key Distribution using Neighbor Graphs," IEEE Wireless Communication Magazine, vol.11, no.1, pp.26-36, Feb.2004.
-
(2004)
IEEE Wireless Communication Magazine
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.2
Petroni Jr., N.X.3
Clancy, T.C.4
Arbaugh, W.5
-
20
-
-
33747586737
-
A Fault Attack on Pairing-Based Cryptography
-
Sept
-
D. Page and F. Vercauteren, "A Fault Attack on Pairing-Based Cryptography", IEEE Trans. Computers, vol.55, no.9, pp. 1075-1080k, Sept. 2006.
-
(2006)
IEEE Trans. Computers
, vol.55
, Issue.9
-
-
Page, D.1
Vercauteren, F.2
-
21
-
-
38549128853
-
-
PBC Library, accessed in February, 2007
-
PBC Library, Benchmarks, accessed in February, 2007, http://rooster. stanford.edu/~ben/pbc/times.html,.
-
Benchmarks
-
-
-
22
-
-
38549140226
-
-
N. Petroni, Jr., An Empirical Analysis of the 4-way Handshake, IEEE 802.11-03/0563-00-000i, http://www.drizzle.com/~aboba/ IEEE.
-
N. Petroni, Jr., "An Empirical Analysis of the 4-way Handshake", IEEE 802.11-03/0563-00-000i, http://www.drizzle.com/~aboba/ IEEE.
-
-
-
-
24
-
-
33646910617
-
Reducing Delay During Handoff in Multi-layered Security Architecture for Wireless LANs in the Corporate Network
-
N. Rajendran, "Reducing Delay During Handoff in Multi-layered Security Architecture for Wireless LANs in the Corporate Network", Proc. WCNM, 2005
-
(2005)
Proc. WCNM
-
-
Rajendran, N.1
-
25
-
-
25844474683
-
Syncscan: Practical Fast Handoff for 802.11 Infrastructure Networks
-
March
-
I. Ramani and S. Savage, "Syncscan: Practical Fast Handoff for 802.11 Infrastructure Networks," Proc. of IEEE INFOCOM'05, March 2005.
-
(2005)
Proc. of IEEE INFOCOM'05
-
-
Ramani, I.1
Savage, S.2
-
27
-
-
38549097229
-
-
Shamus Software Ltd, MIRACL, accessed in February, 2007
-
Shamus Software Ltd - MIRACL, accessed in February, 2007, http://www.shamus.ie/index.php?page=Benchmarks.
-
-
-
-
28
-
-
4544325271
-
Improving the Latency of 802.11 Hand-offs Using Neighbor Graphs
-
Boston, MA, June
-
M. Shin, A. Mishra and W. Arbaugh, "Improving the Latency of 802.11 Hand-offs Using Neighbor Graphs", Proc. ACM MobiSys'04, Boston, MA, June 2004.
-
(2004)
Proc. ACM MobiSys'04
-
-
Shin, M.1
Mishra, A.2
Arbaugh, W.3
-
29
-
-
33846853675
-
Issues With Real-time Streaming Applications Roaming in QoS-based Secure IEEE 802.11 WLANs
-
Nov
-
C.Yap, E. Qi, K. Sood, S. Bangolae and C. Bell, "Issues With Real-time Streaming Applications Roaming in QoS-based Secure IEEE 802.11 WLANs," Proc. 2nd International Conference on Mobile Technology, Applications and Systems, pp.1-7, Nov. 2005.
-
(2005)
Proc. 2nd International Conference on Mobile Technology, Applications and Systems
, pp. 1-7
-
-
Yap, C.1
Qi, E.2
Sood, K.3
Bangolae, S.4
Bell, C.5
-
30
-
-
38549137967
-
-
Voltage Security, Voltage Security Platform Architecture, Voltage Security Whitepaper, http://www.voltage.com, 2006.
-
Voltage Security, "Voltage Security Platform Architecture", Voltage Security Whitepaper, http://www.voltage.com, 2006.
-
-
-
|