-
1
-
-
44349157966
-
-
Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On Traveling Incognito Proc. IEEE Workshop on Mobile Systems and Applications (Dec 1994).
-
Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: "On Traveling Incognito" Proc. IEEE Workshop on Mobile Systems and Applications (Dec 1994).
-
-
-
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Springer
-
Bellare, M., Rogaway, P.: "Entity authentication and key distribution" Proc. CRYPTO 1993, Lect. Notes in Comp. Sci. 773, Springer (1994), 232-249.
-
(1994)
Proc. CRYPTO 1993, Lect. Notes in Comp. Sci
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84957001208
-
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
-
Springer
-
Blake-Wilson, S., Menezes, A.: "Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques" Proc. Security Protocols Workshop, Lect. Notes in Comp. Sci. 1361, Springer (1997), 137-158.
-
(1997)
Proc. Security Protocols Workshop, Lect. Notes in Comp. Sci
, vol.1361
, pp. 137-158
-
-
Blake-Wilson, S.1
Menezes, A.2
-
8
-
-
0033907037
-
Extensions to an Authentication Technique Proposed for the Global Mobility Network
-
IEEE
-
Buttyan, L., Gbaguidi, C., Staamann, S., Wilhelm, U.: "Extensions to an Authentication Technique Proposed for the Global Mobility Network" IEEE Trans. on Communications, 48(3), IEEE (2000), 373-376.
-
(2000)
IEEE Trans. on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
9
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Springer
-
Canetti, R., Krawczyk, H.: "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels" Proc. EUROCRYPT 2001, Lect. Notes in Comp. Sci. 2045, Springer (2001), 453-474.
-
(2001)
Proc. EUROCRYPT 2001, Lect. Notes in Comp. Sci
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
11
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attack
-
April
-
Goldwasser, S., Micali, S., Rivest, R.: "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attack" SIAM J. Computing, 17(2), April 1988, 281-308.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
12
-
-
3042783229
-
A Self-encryption Mechanism for Authentication of Roaming and Teleconference Services
-
IEEE
-
Hwang, K., Chang, C.: "A Self-encryption Mechanism for Authentication of Roaming and Teleconference Services" IEEE Trans. on Wireless Communications, 2(2), IEEE (2003), 400-407.
-
(2003)
IEEE Trans. on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.1
Chang, C.2
-
15
-
-
0029451888
-
Untraceability in Mobile Networks
-
Samfat, D., Molva, R., Asokan, N.: "Untraceability in Mobile Networks" Proc. MobiCom 1995, 26-36.
-
(1995)
Proc. MobiCom
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
16
-
-
44349097639
-
-
Technical Specification Group (TSG) SA: 3GPP TS 33.102: 3rd Generation Partnership Project (3GPP), 3G Security, Security Architecture Oct, 2003.
-
Technical Specification Group (TSG) SA: "3GPP TS 33.102: 3rd Generation Partnership Project (3GPP), 3G Security, Security Architecture" Oct, 2003.
-
-
-
-
17
-
-
26444456234
-
Provably Secure Key Ex-change: An Engineering Approach
-
Tin, Y., Boyd, C., Gonzalez-Nieto, J.: "Provably Secure Key Ex-change: An Engineering Approach" Proc. Australasian Information Security Workshop (AISW2003), 97-104.
-
Proc. Australasian Information Security Workshop (AISW2003)
, pp. 97-104
-
-
Tin, Y.1
Boyd, C.2
Gonzalez-Nieto, J.3
|