-
1
-
-
51349168429
-
-
Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen, and Anand Prasad. Quick NAP-secure and efficient network access protocol. In Proc, 6th International Workshop on Applications and Services in Wireless Networks (ASWN 2006), pages 163-170, Berlin, Germany, May 2006.
-
Jari Arkko, Pasi Eronen, Hannes Tschofenig, Seppo Heikkinen, and Anand Prasad. Quick NAP-secure and efficient network access protocol. In Proc, 6th International Workshop on Applications and Services in Wireless Networks (ASWN 2006), pages 163-170, Berlin, Germany, May 2006.
-
-
-
-
2
-
-
35248872561
-
Cryptographically generated addresses (CGA)
-
Proc. 6th Information Security Conference ISC03, of, Bristol, UK, October, Springer
-
Tuomas Aura. Cryptographically generated addresses (CGA). In Proc. 6th Information Security Conference (ISC03), volume 2851 of LNCS, pages 29-43, Bristol, UK, October 2003. Springer.
-
(2003)
LNCS
, vol.2851
, pp. 29-43
-
-
Aura, T.1
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
4
-
-
3142582567
-
IPv6 opportunistic encryption
-
Technical Report 4568, INRIA, October
-
Claude Castelluccia and Gabriel Montenegro. IPv6 opportunistic encryption. Technical Report 4568, INRIA, October 2002.
-
(2002)
-
-
Castelluccia, C.1
Montenegro, G.2
-
5
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
February
-
Dorothy E. Denning and Peter F. MacDoran. Location-based authentication: Grounding cyberspace for better security. Elsevier Computer Fraud & Security, pages 12-16, February 1996.
-
(1996)
Elsevier Computer Fraud & Security
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
6
-
-
0020720357
-
On the security of public-key protocols
-
August
-
D. Dolev and A. Yao. On the security of public-key protocols. Communications of the ACM, 29(8):198-208, August 1983.
-
(1983)
Communications of the ACM
, vol.29
, Issue.8
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
7
-
-
0003828189
-
Dynamic host configuration protocol. RFC 2131
-
March
-
Ralph Droms. Dynamic host configuration protocol. RFC 2131, IETF, March 1997.
-
(1997)
IETF
-
-
Droms, R.1
-
8
-
-
48649088135
-
Authentication for DHCP messages. RFC 3118
-
June
-
Ralph Droms and Bill Arbaugh. Authentication for DHCP messages. RFC 3118, IETF, June 2001.
-
(2001)
IETF
-
-
Droms, R.1
Arbaugh, B.2
-
9
-
-
51349117522
-
Dynamic host configuration protocol for IPv6 (DHCPv6). RFC 3315
-
July
-
Ralph Droms, Jim Bound, Bernie Volz, Ted Lemon, Charles E. Perkins, and Mike Carney. Dynamic host configuration protocol for IPv6 (DHCPv6). RFC 3315, IETF, July 2003.
-
(2003)
IETF
-
-
Droms, R.1
Bound, J.2
Volz, B.3
Lemon, T.4
Perkins, C.E.5
Carney, M.6
-
10
-
-
51349106094
-
-
Jon Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, 2003.
-
Jon Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, 2003.
-
-
-
-
12
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece, September, IEEE Communications Society
-
Gerhard P. Hancke and Markus G. Kuhn. An RFID distance bounding protocol. In Proc. IEEE SecureComm 2005, Athens, Greece, September 2005. IEEE Communications Society.
-
(2005)
Proc. IEEE SecureComm
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
13
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
April
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proc. IEEE Infocomm 2003, April 2003.
-
(2003)
In Proc. IEEE Infocomm 2003
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
51349150095
-
-
International Telecommunication Union. ITU-T recommendation X.509 (1997 E): Information technology-open systems interconnection-the director): Authentication framework, June 1997.
-
International Telecommunication Union. ITU-T recommendation X.509 (1997 E): Information technology-open systems interconnection-the director): Authentication framework, June 1997.
-
-
-
-
15
-
-
35048826237
-
-
Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proc. 6th International Workshop on Information Hiding, 3200 of LNCS, pages 239-252, Toronto, Canada, May 2004. Springer.
-
Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proc. 6th International Workshop on Information Hiding, volume 3200 of LNCS, pages 239-252, Toronto, Canada, May 2004. Springer.
-
-
-
-
18
-
-
0013091390
-
Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF Network Working Group
-
January
-
Thomas Narten and Richard Draves. Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF Network Working Group, January 2001.
-
(2001)
-
-
Narten, T.1
Draves, R.2
-
19
-
-
33847344453
-
Integrating security, mobility, and multi-homing in a HIP way
-
San Diego, CA USA, February
-
Pekka Nikander, Jukka Ylitalo, and Jorma Wall. Integrating security, mobility, and multi-homing in a HIP way. In Proc. Network and Distributed Systems Security Symposium (NDSS'03), pages 87-99, San Diego, CA USA, February 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium (NDSS'03)
, pp. 87-99
-
-
Nikander, P.1
Ylitalo, J.2
Wall, J.3
-
20
-
-
0030676973
-
-
Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 44-54, Oakland, CA USA, May 1997. IEEE Computer Society Press.
-
Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 44-54, Oakland, CA USA, May 1997. IEEE Computer Society Press.
-
-
-
-
21
-
-
85084164692
-
SSH-secure login connections over the Internet
-
San Jose, CA USA, July, USENIX Association
-
Tatu Ylönen. SSH-secure login connections over the Internet. In Proc. 6th USENIX Security Symposium, pages 37-42, San Jose, CA USA, July 1996. USENIX Association.
-
(1996)
Proc. 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylönen, T.1
|