-
1
-
-
33845564340
-
Securing vehicular communications
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications Magazine, Vol. 13, No. 5, pp. 8-15, 2006.
-
(2006)
IEEE Wireless Communications Magazine
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
2
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Vol. 15, No. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
3
-
-
1842665111
-
Proactive key distribution using neighbor graphs
-
A. Mishra, M. H. Shin, N. L. Petroni, Jr., T. C. Clancy, and W. A. Arbauch, "Proactive key distribution using neighbor graphs," IEEE Wireless Communications, Vol. 11, No. 1, pp. 26-36, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.H.2
Petroni Jr., N.L.3
Clancy, T.C.4
Arbauch, W.A.5
-
4
-
-
33744909327
-
-
H. Wang and A. R. Prasad, Fast authentication for inter-domain handover, In Proc. of Conference on Telecommunications (ICT'04), LNCS of 3124, pp. 973-982, 2004.
-
H. Wang and A. R. Prasad, "Fast authentication for inter-domain handover," In Proc. of Conference on Telecommunications (ICT'04), LNCS of 3124, pp. 973-982, 2004.
-
-
-
-
5
-
-
33744920849
-
-
K. Hong, S. Jung, and S. Felix Wu, A hash-chain based authentication scheme for fast handover in wireless network, In Proc. of the International Workshop on Information Security Applications, LNCS of 3786, pp. 96-107, 2006.
-
K. Hong, S. Jung, and S. Felix Wu, "A hash-chain based authentication scheme for fast handover in wireless network," In Proc. of the International Workshop on Information Security Applications, LNCS of 3786, pp. 96-107, 2006.
-
-
-
-
7
-
-
33846307093
-
Privacy-enhanced, Attack-resilient Access Control in Pervasive Environments with Optional Context Authentication Capability
-
K. Ren and W. Lou, "Privacy-enhanced, Attack-resilient Access Control in Pervasive Environments with Optional Context Authentication Capability," ACM Mobile Networks and Applications, Vol. 12, pp. 79-92, 2007.
-
(2007)
ACM Mobile Networks and Applications
, vol.12
, pp. 79-92
-
-
Ren, K.1
Lou, W.2
-
8
-
-
23044435711
-
Short signature from the weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short signature from the weil pairing" Journal of Cryptology, Vol, 17, No. 4, pp. 297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
9
-
-
0001604533
-
Blind signatures for untraceable payments
-
D. Chaum, "Blind signatures for untraceable payments," In Proc. of Advance in Cryptology, pp. 199-203, 1982.
-
(1982)
Proc. of Advance in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, L. A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
11
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Transactions on Fundamentals, Vol. E84-A, pp. 1234-1243, 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84-A
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
13
-
-
0003535506
-
-
IETF RFC 2865
-
C. Rigney, S. Willens, A. Rubens, W. Simpson, "Remote authentication dial in user service (RADIUS)," IETF RFC 2865, 2000.
-
(2000)
Remote authentication dial in user service (RADIUS)
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
14
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol. 22, No, 5 pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.5
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
|