-
1
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications, vol.1, no.l, pp.24-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.L
, pp. 24-31
-
-
Aziz, A.1
Diffie, W.2
-
2
-
-
0027641891
-
Privacy and authentication
-
M. J. Beller, L. F. Chang, and Y. Yacobi, Privacy and authentication, IEEE Journal on Selected Area in Communications, vol.11, no.6, pp.821-829, 1993.
-
(1993)
IEEE Journal on Selected Area in Communications
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.J.1
Chang, L.F.2
Yacobi, Y.3
-
3
-
-
0031637758
-
A simple logic for authentication protocol design
-
Rockport, pp
-
L. Buttyán, S. Staamann and U. Wilhelm, A simple logic for authentication protocol design, Proc. of 11th IEEE Computer Security Foundations Workshop, Rockport, pp.153-162, 1998.
-
(1998)
Proc. of 11th IEEE Computer Security Foundations Workshop
, pp. 153-162
-
-
Buttyán, L.1
Staamann, S.2
Wilhelm, U.3
-
4
-
-
48249099653
-
A practical three-party key exchange protocol with round efficiency
-
Y.-F. Chang, A practical three-party key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, vol.4, no.4, pp.953-960, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.4
, pp. 953-960
-
-
Chang, Y.-F.1
-
5
-
-
63649101521
-
Robust t-out-of-n proxy signature based on RSA cryptosystems
-
Y.-F. Chang and C.-C. Chang, Robust t-out-of-n proxy signature based on RSA cryptosystems, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp.425-431, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.2
, pp. 425-431
-
-
Chang, Y.-F.1
Chang, C.-C.2
-
6
-
-
48249090019
-
An efficient generalized group-oriented signature scheme
-
C.-Y. Chen, H.-F. Lin and C.-C. Chang, An efficient generalized group-oriented signature scheme, International Journal of Innovative Computing, Information and Control, vol.4, no.6, pp. 1335-1345, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.6
, pp. 1335-1345
-
-
Chen, C.-Y.1
Lin, H.-F.2
Chang, C.-C.3
-
8
-
-
84958780603
-
Authentication and payment in future mobile systems, Computer Security - ESORICS'98
-
G. Horn and B. Preneel, Authentication and payment in future mobile systems, Computer Security - ESORICS'98, LNCS 1485, pp.277-293, 1998.
-
(1998)
LNCS
, vol.1485
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
9
-
-
0035281433
-
An efficient anonymous channel protocol in wireless communications
-
J.-K. Jan and W.-D. Lin, An efficient anonymous channel protocol in wireless communications, IEICE Transactions on Communications, vol.E84-B, pp.484-491, 2001.
-
(2001)
IEICE Transactions on Communications
, vol.E84-B
, pp. 484-491
-
-
Jan, J.-K.1
Lin, W.-D.2
-
10
-
-
0033365053
-
Anonymous channel and authentication in wireless communications
-
W.-S. Juang, C.-L. Lei, and C.-Y. Chang, Anonymous channel and authentication in wireless communications, Computer Communications, vol.22, no.15-16, pp.1502-1511, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.15-16
, pp. 1502-1511
-
-
Juang, W.-S.1
Lei, C.-L.2
Chang, C.-Y.3
-
11
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances in Cryptology, CRYPTO'99, pp.388-397, 1999.
-
(1999)
Advances in Cryptology, CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
63849290284
-
-
W.-K. Lai, C.-S. Shieh, and Y.-C. Kuo, Reliable broadcasting in ad hoc wireless networks with mac mini-slots and directional antennas, International Journal of Innovative Computing, Information and Control, 3, no.6(A), pp.1487-1500, 2007.
-
W.-K. Lai, C.-S. Shieh, and Y.-C. Kuo, Reliable broadcasting in ad hoc wireless networks with mac mini-slots and directional antennas, International Journal of Innovative Computing, Information and Control, vol.3, no.6(A), pp.1487-1500, 2007.
-
-
-
-
13
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
C.-C. Lee, M.-S. Hwang, and I-E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Transactions on Industrial Electronics, vol.53, no.5, pp. 1683-1687, 2006.
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
14
-
-
34547877223
-
Secure communications for cluster-based ad hoc networks using node identities
-
J.-S. Lee and C.-C. Chang, Secure communications for cluster-based ad hoc networks using node identities, Journal of Network and Computer Applications, vol.30, no.4, pp.1377-1396, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.4
, pp. 1377-1396
-
-
Lee, J.-S.1
Chang, C.-C.2
-
15
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, no.5, pp.541-552, 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
16
-
-
4544241048
-
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
-
S. Minghui, S. Xuemin, and J. W. Mark, IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks, IEEE Wireless Communications, vol.11, no.4, pp.66-75, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.4
, pp. 66-75
-
-
Minghui, S.1
Xuemin, S.2
Mark, J.W.3
-
17
-
-
84957794888
-
Forward secrecy and its application to future mobile communication security
-
Proc. of the Third International Workshop on Practice and Theory in Public Key Cryptosystems
-
D. G. Park, C. Boyd, and S. J. Moon, Forward secrecy and its application to future mobile communication security, Proc. of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 1751, pp.433-445, 2000.
-
(2000)
LNCS
, vol.1751
, pp. 433-445
-
-
Park, D.G.1
Boyd, C.2
Moon, S.J.3
-
18
-
-
0032682170
-
Hash-based encryption system
-
M. Peyravian, A. Roginsky, and N. Zunic, Hash-based encryption system, Computers and Security, vol.18, pp.345-350, 1999.
-
(1999)
Computers and Security
, vol.18
, pp. 345-350
-
-
Peyravian, M.1
Roginsky, A.2
Zunic, N.3
-
19
-
-
48249156554
-
Extraction of values representing human features in order to develop a privacy-preserving sensor
-
M. Saito, Y. Namba, and S. Serikawa, Extraction of values representing human features in order to develop a privacy-preserving sensor, International Journal of Innovative Computing, Information and Control, vol.4, no.4, pp.883-895, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.4
, pp. 883-895
-
-
Saito, M.1
Namba, Y.2
Serikawa, S.3
-
20
-
-
0003855464
-
-
2nd edition, John Wiley & Sons Inc
-
B. Schneier, Applied Cryptography, 2nd edition, John Wiley & Sons Inc., 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
21
-
-
38149099184
-
A simple and efficient key exchange scheme against the smart card loss problem
-
EUC Workshops 2001
-
R.-C. Wang, W.-S. Juang, and C.-L. Lei, A simple and efficient key exchange scheme against the smart card loss problem, EUC Workshops 2001, LNCS 4809, pp.728-744, 2007.
-
(2007)
LNCS
, vol.4809
, pp. 728-744
-
-
Wang, R.-C.1
Juang, W.-S.2
Lei, C.-L.3
-
22
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
X. M. Wang, W.-F. Zhang, J.-S. Zhang, and M.-K. Khan, Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards & Interfaces, vol.29, pp.507-512, 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.-F.2
Zhang, J.-S.3
Khan, M.-K.4
-
24
-
-
25844519837
-
A secure and efficient authentication protocol for anonymous channel in wireless communications
-
C.-C. Yang, Y.-L. Tang, R.-C. Wang, and H.-W. Yang, A secure and efficient authentication protocol for anonymous channel in wireless communications, Applied Mathematics and Computation, vol.169, pp. 1431-1439, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.169
, pp. 1431-1439
-
-
Yang, C.-C.1
Tang, Y.-L.2
Wang, R.-C.3
Yang, H.-W.4
-
25
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhu and J. Ma, A new authentication scheme with anonymity for wireless environments, IEEE Transactions on Consumer Electronics, vol.50, no.l, pp.230-234, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.L
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
|