-
1
-
-
50249150271
-
-
Specification of the bluetooth system version 1.2, November 2003
-
Specification of the bluetooth system (version 1.2), November 2003.
-
-
-
-
3
-
-
68249131357
-
X9.63-2001: Key agreement and key transport using elliptical curve cryptography
-
ANSI, Technical report, American National Standards Institute
-
ANSI. X9.63-2001: Key agreement and key transport using elliptical curve cryptography. Technical report, American National Standards Institute, 2001.
-
(2001)
-
-
-
4
-
-
33751508709
-
-
NIST special publication 800-57, revised
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. Recommendation for key management. NIST special publication 800-57, revised, 2006.
-
(2006)
Recommendation for key management
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
5
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer. Generalized privacy amplification. IEEE Transaction on Information Theory, 41(6):1915-1923, Nov. 1995.
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
6
-
-
35048848152
-
Short signatures without random oracles
-
EUROCRYPT 2004
-
D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT 2004, Springer LNCS 3027.
-
Springer LNCS
, vol.3027
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In Proceedings of the IEEE International Conference on Distributed Computing Systems, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Distributed Computing Systems
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
11
-
-
24944508408
-
Distillation codes and applications to DoS resistant multicast authentication
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and D. Tygar. Distillation codes and applications to DoS resistant multicast authentication. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2004.
-
(2004)
Proceedings of the Network and Distributed Systems Security Symposium (NDSS)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, D.5
-
13
-
-
18844450713
-
On link layer denial of service in data wireless lans: Research articles
-
G. Lin and G. Noubir. On link layer denial of service in data wireless lans: Research articles. Wireless Communications & Mobile Computing, 5(3), 2005.
-
(2005)
Wireless Communications & Mobile Computing
, vol.5
, Issue.3
-
-
Lin, G.1
Noubir, G.2
-
18
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo. Effective erasure codes for reliable computer communication protocols. ACM SIGCOMM Comput. Commun. Rev., 27(2), 1997.
-
(1997)
ACM SIGCOMM Comput. Commun. Rev
, vol.27
, Issue.2
-
-
Rizzo, L.1
-
22
-
-
34247391971
-
Integrity regions: Authentication through presence in wireless networks
-
New York, NY, USA, ACM
-
S. Čapkun and M. Čagalj. Integrity regions: authentication through presence in wireless networks. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless security, pages 1-10, New York, NY, USA, 2006. ACM.
-
(2006)
WiSe '06: Proceedings of the 5th ACM workshop on Wireless security
, pp. 1-10
-
-
Čapkun, S.1
Čagalj, M.2
-
23
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D.Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|