-
1
-
-
33745797863
-
Untraceable rfid tags via insubvertible encryption
-
G. Ateniese, J. Camenisch, and B. de Medeiros. Untraceable rfid tags via insubvertible encryption. In CCS '05, pages 92-101, 2005.
-
(2005)
CCS '05
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
de Medeiros, B.3
-
2
-
-
49149122758
-
Towards plaintext-aware public-key encryption without random oracles. Cryptology ePrint Archive
-
Report 2004/221
-
M. Bellare and A. Palacio. Towards plaintext-aware public-key encryption without random oracles. Cryptology ePrint Archive, Report 2004/221, 2004.
-
(2004)
-
-
Bellare, M.1
Palacio, A.2
-
3
-
-
35248891000
-
Forward-security in private-key cryptography
-
M. Bellare and B. S. Yee. Forward-security in private-key cryptography. In CT-RSA, pages 1-18, 2003.
-
(2003)
CT-RSA
, pp. 1-18
-
-
Bellare, M.1
Yee, B.S.2
-
5
-
-
1542300188
-
Dependable and secure data storage and retrieval in mobile, wireless networks
-
S. Chessa and P. Maestrini. Dependable and secure data storage and retrieval in mobile, wireless networks. In DSN 2003, pages 207-216, 2003.
-
(2003)
DSN 2003
, pp. 207-216
-
-
Chessa, S.1
Maestrini, P.2
-
6
-
-
84916234671
-
-
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Catch me (if you can): Data survival in unattended sensor networks. In http://www.dsi.uniromal.it/~dipietro/catchme.pdf, 2007.
-
(2007)
Catch me (if you can): Data survival in unattended sensor networks
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
7
-
-
84947441722
-
Robust and efficient sharing of rsa functions
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of rsa functions. In CRYPTO, pages 157-172, 1996.
-
(1996)
CRYPTO
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
84947926543
-
Robust threshold dss signatures
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold dss signatures. In EUROCRYPT, pages 354-371, 1996.
-
(1996)
EUROCRYPT
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
15344340443
-
Data replication effectiveness in mobile ad-hoc networks
-
V. Gianuzzi. Data replication effectiveness in mobile ad-hoc networks. In ACM PE-WASUN '04, pages 17-22, 2004.
-
(2004)
ACM PE-WASUN '04
, pp. 17-22
-
-
Gianuzzi, V.1
-
10
-
-
85008556094
-
Data replication for improving data accessibility in ad hoc networks
-
T. Hara and S. K. Madria. Data replication for improving data accessibility in ad hoc networks. IEEE Trans. Mob. Comput., 5:1515-1532, 2006.
-
(2006)
IEEE Trans. Mob. Comput
, vol.5
, pp. 1515-1532
-
-
Hara, T.1
Madria, S.K.2
-
11
-
-
33750337505
-
Growth codes: Maximizing sensor network data persistence
-
A. Kamra, V. Misra, J. Feldman, and D. Rubenstein. Growth codes: maximizing sensor network data persistence. SIGCOMM Comput. Commun. Rev., 36(4):255-266, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
, pp. 255-266
-
-
Kamra, A.1
Misra, V.2
Feldman, J.3
Rubenstein, D.4
-
13
-
-
85027164480
-
How to withstand mobile virus attacks
-
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In PODC, pages 51-59, 1991.
-
(1991)
PODC
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
14
-
-
33144467802
-
Secure data communication in mobile ad hoc networks
-
P. Papadimitratos and Z. Haas. Secure data communication in mobile ad hoc networks. IEEE JSAC, 24(2):343-356, 2006.
-
(2006)
IEEE JSAC
, vol.24
, Issue.2
, pp. 343-356
-
-
Papadimitratos, P.1
Haas, Z.2
-
15
-
-
49149112695
-
Oaep reconsidered. Cryptology ePrint Archive
-
Report 2000/060
-
V. Shoup. Oaep reconsidered. Cryptology ePrint Archive, Report 2000/060, 2000.
-
(2000)
-
-
Shoup, V.1
|