-
1
-
-
40149094423
-
-
See: http://en.wikipedia.org/wiki/Avalanche_effect.
-
See: http://en.wikipedia.org/wiki/Avalanche_effect.
-
-
-
-
2
-
-
40149084433
-
-
D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers: authentication in ad hoc wireless networks, in: Symposium on Network and Distributed Systems Security, San Diego, California, USA, 2002.
-
D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers: authentication in ad hoc wireless networks, in: Symposium on Network and Distributed Systems Security, San Diego, California, USA, 2002.
-
-
-
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology-Crypto 1993, Springer-Verlag
-
Bellare M., and Rogaway P. Entity authentication and key distribution. Advances in Cryptology-Crypto 1993. LNCS vol. 773 (1993), Springer-Verlag 232-249
-
(1993)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0031642585
-
-
M. Bellare, R. Canetti, H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, in: 30th STOC, 1998.
-
M. Bellare, R. Canetti, H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, in: 30th STOC, 1998.
-
-
-
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology-Eurocrypt 2000, Springer-Verlag
-
Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology-Eurocrypt 2000. LNCS vol. 1807 (2000), Springer-Verlag 139-155
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
40149089357
-
-
See: www.bluetooth.com/developer/specification/specification.asp.
-
See: www.bluetooth.com/developer/specification/specification.asp.
-
-
-
-
7
-
-
40149084127
-
-
Simple Pairing White Paper. See: www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf.
-
Simple Pairing White Paper. See: www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf.
-
-
-
-
8
-
-
31344438973
-
-
M. over(C, ̌)agalj, S. over(C, ̌)apkun, J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE, Special Issue on Security and Cryptography, vol. 94, no. 2, February 2006.
-
M. over(C, ̌)agalj, S. over(C, ̌)apkun, J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE, Special Issue on Security and Cryptography, vol. 94, no. 2, February 2006.
-
-
-
-
9
-
-
35048860626
-
Analysis for key-exchange protocols and their use for building secure channels
-
Advances in Cryptology-Eurocrypt 2001, Springer-Verlag
-
Canetti R., and Krawczyk H. Analysis for key-exchange protocols and their use for building secure channels. Advances in Cryptology-Eurocrypt 2001. LNCS vol. 2045 (2001), Springer-Verlag 453-474
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
10
-
-
24944566824
-
Universally composable password-based key exchange
-
Advances in Cryptology-Eurocrypt 2005, Springer-Verlag
-
Canetti R., Halevi S., Katz J., Lindell Y., and MacKenzie P. Universally composable password-based key exchange. Advances in Cryptology-Eurocrypt 2005. LNCS vol. 3494 (2005), Springer-Verlag 404-421
-
(2005)
LNCS
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
12
-
-
24644483295
-
Exploiting empirical engagement in authentication protocol design
-
Proceedings of 2nd International Conference on Security in Pervasive Computing (SPC ′05). Hutter D., and Ullmann M. (Eds), Springer, Boppard, Germany
-
Creese S.J., Goldsmith M.H., Harrison R., Roscoe A.W., Whittaker P., and Zakiuddin I. Exploiting empirical engagement in authentication protocol design. In: Hutter D., and Ullmann M. (Eds). Proceedings of 2nd International Conference on Security in Pervasive Computing (SPC ′05). LNSC vol. 3450 (2005), Springer, Boppard, Germany
-
(2005)
LNSC
, vol.3450
-
-
Creese, S.J.1
Goldsmith, M.H.2
Harrison, R.3
Roscoe, A.W.4
Whittaker, P.5
Zakiuddin, I.6
-
13
-
-
33751023842
-
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of IEEE Security Track, 2006.
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of IEEE Security Track, 2006.
-
-
-
-
14
-
-
40149108852
-
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, The attacker in ubiquitous computing environments: formalising the threat model, in: T. Dimitrakos, F. Martinelli (Eds.), Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003, IIT-CNR Technical Report.
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, The attacker in ubiquitous computing environments: formalising the threat model, in: T. Dimitrakos, F. Martinelli (Eds.), Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003, IIT-CNR Technical Report.
-
-
-
-
15
-
-
40149109275
-
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, Security properties and mechanisms in human-centric computing, in: P. Robinson, H, Vogt, W. Wagealla (Eds.), Privacy, Security and Trust within the Context of Pervasive Computing, Kluwer International Series in Engineering and Computer Science, Springer, 2004. Proceedings of Workshop on Security and Privacy in Pervasive Computing, Wien, April 2004.
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, Security properties and mechanisms in human-centric computing, in: P. Robinson, H, Vogt, W. Wagealla (Eds.), Privacy, Security and Trust within the Context of Pervasive Computing, Kluwer International Series in Engineering and Computer Science, Springer, 2004. Proceedings of Workshop on Security and Privacy in Pervasive Computing, Wien, April 2004.
-
-
-
-
16
-
-
23944521144
-
Manual authentication for wireless devices
-
Gehrmann C., Mitchell C., and Nyberg K. Manual authentication for wireless devices. RSA Cryptobytes 7 1 (2004) 29-37
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
17
-
-
24644434353
-
Security in personal area networks
-
Mitchell C.J. (Ed), IEE, London
-
Gehrmann C., and Nyberg K. Security in personal area networks. In: Mitchell C.J. (Ed). Security for Mobility (2004), IEE, London 191-230
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
18
-
-
0024868772
-
-
O. Goldreich, L.A. Levin, A hard-core predicate for all one-way functions, in: Annual ACM Symposium on Theory of Computing, 1989, pp. 25-32.
-
O. Goldreich, L.A. Levin, A hard-core predicate for all one-way functions, in: Annual ACM Symposium on Theory of Computing, 1989, pp. 25-32.
-
-
-
-
21
-
-
24644472550
-
Ephemeral pairing on anonymous networks
-
2nd International Conference on Security in Pervasive Computing (SPC ′05). Hutter D., and Ullmann M. (Eds), Springer, Boppard, Germany
-
Hoepman J.-H. Ephemeral pairing on anonymous networks. In: Hutter D., and Ullmann M. (Eds). 2nd International Conference on Security in Pervasive Computing (SPC ′05). LNSC vol. 3450 (2005), Springer, Boppard, Germany 101-116
-
(2005)
LNSC
, vol.3450
, pp. 101-116
-
-
Hoepman, J.-H.1
-
22
-
-
34247333484
-
Ephemeral pairing problem
-
8th International Conference Fin. Crypt., Springer
-
Hoepman J.-H. Ephemeral pairing problem. 8th International Conference Fin. Crypt. LNCS vol. 3110 (2004), Springer 212-226
-
(2004)
LNCS
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
23
-
-
84935078039
-
Security weaknesses in bluetooth
-
CT-RSA 2001, Springer-Verlag
-
Jakobsson M., and Wetzel S. Security weaknesses in bluetooth. CT-RSA 2001. LNCS vol. 2020 (2001), Springer-Verlag 176-191
-
(2001)
LNCS
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
24
-
-
84991939136
-
-
H. Krawczyk, LFSR-based hashing and authentication, in: CRYPTO 1994, LNCS, vol. 839, 1994, pp. 129-139.
-
H. Krawczyk, LFSR-based hashing and authentication, in: CRYPTO 1994, LNCS, vol. 839, 1994, pp. 129-139.
-
-
-
-
25
-
-
84957367286
-
-
H. Krawczyk, New hash functions for message authentication, in: EUROCRYPT 1995, LNCS, vol. 921, 1995, pp. 301-310.
-
H. Krawczyk, New hash functions for message authentication, in: EUROCRYPT 1995, LNCS, vol. 921, 1995, pp. 301-310.
-
-
-
-
26
-
-
40149088897
-
-
D. Knuth, The art of computer programming, Seminumerical Algorithms, third ed., vol. 2, Addison-Wesley, Reading, MA, 1997, ISBN: 0-201-89684-2.
-
D. Knuth, The art of computer programming, Seminumerical Algorithms, third ed., vol. 2, Addison-Wesley, Reading, MA, 1997, ISBN: 0-201-89684-2.
-
-
-
-
27
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, Springer-Verlag
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for the Construction and Analysis of Systems. LNCS vol. 1055 (1996), Springer-Verlag 147-166
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
28
-
-
40149087966
-
-
Princeton University Press
-
Luby M. Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes (1996), Princeton University Press
-
(1996)
Princeton Computer Science Notes
-
-
Luby, M.1
-
29
-
-
0025106672
-
-
Y. Mansour, N. Nisan, P. Tiwari, The computational complexity of universal hashing, in: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 1990, pp. 235-243.
-
Y. Mansour, N. Nisan, P. Tiwari, The computational complexity of universal hashing, in: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 1990, pp. 235-243.
-
-
-
-
30
-
-
40149106888
-
-
L.H. Nguyen, A.W. Roscoe, Efficient group authentication protocol based on human interaction, in: Proceedings of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, August 2006, pp. 9-31.
-
L.H. Nguyen, A.W. Roscoe, Efficient group authentication protocol based on human interaction, in: Proceedings of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, August 2006, pp. 9-31.
-
-
-
-
31
-
-
33745832230
-
SAS-based authenticated key agreement
-
Public Key Cryptography-PKC'06: The 9th International Workshop on Theory and Practice in Public Key Cryptography, Springer
-
Pasini S., and Vaudenay S. SAS-based authenticated key agreement. Public Key Cryptography-PKC'06: The 9th International Workshop on Theory and Practice in Public Key Cryptography. LNCS vol. 3958 (2006), Springer 395-409
-
(2006)
LNCS
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
32
-
-
33745637238
-
An optimal non-interactive message authentication protocol
-
Topics in Cryptology-CT-RSA'06: The Cryptographers' Track at the RSA Conference 2006, Springer
-
Pasini S., and Vaudenay S. An optimal non-interactive message authentication protocol. Topics in Cryptology-CT-RSA'06: The Cryptographers' Track at the RSA Conference 2006. LNCS vol. 3860 (2006), Springer 280-294
-
(2006)
LNCS
, vol.3860
, pp. 280-294
-
-
Pasini, S.1
Vaudenay, S.2
-
33
-
-
33745121720
-
-
T. Peyrin, S. Vaudenay, The pairing problem with user interaction, in: SEC 2005, 2005, pp. 251-266.
-
T. Peyrin, S. Vaudenay, The pairing problem with user interaction, in: SEC 2005, 2005, pp. 251-266.
-
-
-
-
34
-
-
40149096777
-
-
A.W. Roscoe, Human-centred Computer Security. See: http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/113.pdf, 2005.
-
A.W. Roscoe, Human-centred Computer Security. See: http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/113.pdf, 2005.
-
-
-
-
35
-
-
84947251443
-
The resurrecting duckling: security issues for ad-hoc wireless networks
-
Security Protocols 1999, Springer-Verlag
-
Stajano F., and Anderson R. The resurrecting duckling: security issues for ad-hoc wireless networks. Security Protocols 1999. LNCS vol. 1976 (1999), Springer-Verlag 172-194
-
(1999)
LNCS
, vol.1976
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
36
-
-
71049183202
-
Universal hashing and authentication codes
-
Advances in Cryptology-Crypto 1991, Springer-Verlag
-
Stinson D.R. Universal hashing and authentication codes. Advances in Cryptology-Crypto 1991. LNCS vol. 576 (1992), Springer-Verlag 74-85
-
(1992)
LNCS
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
37
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology-Crypto 2005, Springer-Verlag
-
Vaudenay S. Secure communications over insecure channels based on short authenticated strings. Advances in Cryptology-Crypto 2005. LNCS vol. 3621 (2005), Springer-Verlag 309-326
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
38
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman M.N., and Carter J.L. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22 (1981) 265-279
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
39
-
-
85020573990
-
On the design of S-boxes
-
CRYPTO 1985, Springer Verlag
-
Webster A.F., and Tavares S.E. On the design of S-boxes. CRYPTO 1985. LNCS vol. 218 (1986), Springer Verlag 523-534
-
(1986)
LNCS
, vol.218
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
-
40
-
-
40149093202
-
-
F.-L. Wong, F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, LNCS, Cambridge, England, 2005.
-
F.-L. Wong, F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, LNCS, Cambridge, England, 2005.
-
-
-
|