-
1
-
-
0036448548
-
A key escrow scheme with time-limited monitoring for one-way communication
-
Abe, M. and Kanda, M. (2002) ‘A key escrow scheme with time-limited monitoring for one-way communication’, The Computer Journal, Vol. 45, No. 6, pp.661–671.
-
(2002)
The Computer Journal
, vol.45
, Issue.6
, pp. 661-671
-
-
Abe, M.1
Kanda, M.2
-
2
-
-
4344693676
-
Key recovery for the commercial environment
-
Gonzáles Nieto, J.M., Viswanathan, K., Boyd, C., Clark, A. and Dawson, E. (2002) ‘Key recovery for the commercial environment’, International Journal of Information Security, Vol. 1, No. 3, pp.161–174.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.3
, pp. 161-174
-
-
Gonzáles Nieto, J.M.1
Viswanathan, K.2
Boyd, C.3
Clark, A.4
Dawson, E.5
-
3
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Hwang, K.F. and Chang, C.C. (2003) ‘A self-encryption mechanism for authentication of roaming and teleconference services’, IEEE Transactions on Wireless Communications, Vol. 2, pp.400–407.
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
4
-
-
0033343111
-
Dynamic participation in a secure conference scheme for mobile communications
-
Hwang, M.S. (1999) ‘Dynamic participation in a secure conference scheme for mobile communications’, IEEE Transactions on Vehicular Technology, Vol. 48, pp.1469–1474.
-
(1999)
IEEE Transactions on Vehicular Technology
, vol.48
, pp. 1469-1474
-
-
Hwang, M.S.1
-
5
-
-
0029256120
-
Conference key distribution schemes for secure digital mobile communications
-
Hwang, M.S. and Yang, W.P. (1995) ‘Conference key distribution schemes for secure digital mobile communications’, IEEE Journal on Selected Areas in Communications, Vol. 13, pp.416–420.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, pp. 416-420
-
-
Hwang, M.S.1
Yang, W.P.2
-
6
-
-
0035039150
-
Comments on “Dynamic participation in a secure conference scheme for mobile communications”
-
Ng, S.L. (2001) ‘Comments on “Dynamic participation in a secure conference scheme for mobile communications”’, IEEE Transactions on Vehicular Technology, Vol. 50, pp.334–335.
-
(2001)
IEEE Transactions on Vehicular Technology
, vol.50
, pp. 334-335
-
-
Ng, S.L.1
-
7
-
-
2442620328
-
Comments on mutual authentication and key exchange protocols for low power wireless communications
-
Ng, S.L. and Mitchell, C. (2004) ‘Comments on mutual authentication and key exchange protocols for low power wireless communications’, IEEE Communications Letters, Vol. 8, pp.262–263.
-
(2004)
IEEE Communications Letters
, vol.8
, pp. 262-263
-
-
Ng, S.L.1
Mitchell, C.2
-
8
-
-
0003851399
-
-
2nd edition, John Wiely & Sons, Inc.
-
Schneier, B. (1996) Applied Cryptography: Protocols, Algorithm, and Source Code C, 2nd edition, John Wiely & Sons, Inc., pp.70–72.
-
(1996)
Applied Cryptography: Protocols, Algorithm, and Source Code C
, pp. 70-72
-
-
Schneier, B.1
-
9
-
-
0037942544
-
Cryptanalysis of mutual authentication and key exchange for low power wireless communications
-
Shim, K. (2003) ‘Cryptanalysis of mutual authentication and key exchange for low power wireless communications’, IEEE Communications Letters, Vol. 7, pp.248–250.
-
(2003)
IEEE Communications Letters
, vol.7
, pp. 248-250
-
-
Shim, K.1
-
10
-
-
0035727184
-
Mutual authentication and key exchange for low power wireless communications
-
Wong, D.S. and Chan, A.H. (2001) ‘Mutual authentication and key exchange for low power wireless communications’, Proceedings of IEEE Military Communications Conference, MILCOM 2001, Vol. 1, pp.39–43.
-
(2001)
Proceedings of IEEE Military Communications Conference, MILCOM 2001
, vol.1
, pp. 39-43
-
-
Wong, D.S.1
Chan, A.H.2
|