-
1
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
Mar
-
G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication protocols for mobile network environment value-added services," IEEE Trans. Veh. Technol., vol. 51, no. 2, pp. 383-392, Mar. 2002.
-
(2002)
IEEE Trans. Veh. Technol
, vol.51
, Issue.2
, pp. 383-392
-
-
Horn, G.1
Martin, K.M.2
Mitchell, C.J.3
-
2
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proc. ACISP, 1998, vol. LNCS 1438, pp. 344-355.
-
(1998)
Proc. ACISP
, vol.LNCS
, Issue.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
3
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environments
-
Jul
-
K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environments," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1373-1384, Jul. 2006.
-
(2006)
IEEE Trans. Veh. Technol
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
4
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Sep
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
5
-
-
33745619805
-
Identity-based key agreement with unilateral identity privacy using pairings
-
Z. Cheng, L. Chen, R. Comley, and Q. Tang, "Identity-based key agreement with unilateral identity privacy using pairings," in Proc. 2nd ISPEC, 2006, vol. LNCS 3903, pp. 202-213.
-
(2006)
Proc. 2nd ISPEC
, vol.LNCS 3903
, pp. 202-213
-
-
Cheng, Z.1
Chen, L.2
Comley, R.3
Tang, Q.4
-
10
-
-
11944251256
-
Anonymous wireless authentication on a portable cellular mobile system
-
Oct
-
S. J. Wang, "Anonymous wireless authentication on a portable cellular mobile system," IEEE Trans. Comput., vol. 53, no. 10, pp. 1317-1329, Oct. 2004.
-
(2004)
IEEE Trans. Comput
, vol.53
, Issue.10
, pp. 1317-1329
-
-
Wang, S.J.1
-
11
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC
-
Z. Jia, Y. Zhang, H. Shao, Y. Lin, and J. Wang, "A remote user authentication scheme using bilinear pairings and ECC," in Proc. ISDA, 2006, vol. 2, pp. 1091-1094.
-
(2006)
Proc. ISDA
, vol.2
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
13
-
-
48649086275
-
A secure and efficient scheme of remote user authentication based on bilinear pairings
-
Y. Liao and S. Wang, "A secure and efficient scheme of remote user authentication based on bilinear pairings," in Proc. TENCON, 2007, pp. 1-4.
-
(2007)
Proc. TENCON
, pp. 1-4
-
-
Liao, Y.1
Wang, S.2
-
14
-
-
38049001913
-
Novel remote user authentication scheme using bilinear pairings
-
C. Yang, W. Ma, and X. Wang, "Novel remote user authentication scheme using bilinear pairings," in Proc. ATC, 2007, vol. LNCS 4610, pp. 306-312.
-
(2007)
Proc. ATC
, vol.LNCS
, Issue.4610
, pp. 306-312
-
-
Yang, C.1
Ma, W.2
Wang, X.3
-
15
-
-
37349011768
-
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices
-
Y. M. Tseng, T. Y. Wu, and J. D. Wu, "A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices," in Proc. COMPAC, 2007, vol. 2, pp. 700-710.
-
(2007)
Proc. COMPAC
, vol.2
, pp. 700-710
-
-
Tseng, Y.M.1
Wu, T.Y.2
Wu, J.D.3
-
16
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
-
(1984)
Proc. CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, 2001, vol. LNCS 2139, pp. 213-229.
-
(2001)
Proc. CRYPTO
, vol.LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
18
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Oct.-Dec
-
Y. Zhang, W. Liu, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable Secure Comput. vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
-
19
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Proc. CRYPTO, 2002, pp. 354-368.
-
(2002)
Proc. CRYPTO
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
20
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
F. Bao, R. H. Deng, and H. Zhu, "Variations of Diffie-Hellman problem," in Proc. ICS, 2003, pp. 301-312.
-
(2003)
Proc. ICS
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
21
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
Aug
-
K. G. Paterson, "ID-based signatures from pairings on elliptic curves," Electron. Lett., vol. 38, no. 18, pp. 1025-1026, Aug. 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
22
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Conf. Comput. Commun. Security, 1993, pp. 62-73.
-
(1993)
Proc. 1st ACM Conf. Comput. Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
23
-
-
1642409507
-
An identity-based signature from gap Diffie-Hellman groups
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," in Proc. PKC, 2003, pp. 18-30.
-
(2003)
Proc. PKC
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
24
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. 9th Int. Workshop Sel. Area Cryptography, 2004, pp. 310-324.
-
(2004)
Proc. 9th Int. Workshop Sel. Area Cryptography
, pp. 310-324
-
-
Hess, F.1
-
25
-
-
0037330749
-
An identity-based signature scheme from the Weil pairing
-
Feb
-
X. Yi, "An identity-based signature scheme from the Weil pairing," IEEE Commun. Lett., vol. 7, no. 2, pp. 76-78, Feb. 2003.
-
(2003)
IEEE Commun. Lett
, vol.7
, Issue.2
, pp. 76-78
-
-
Yi, X.1
-
26
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
P. Barreto, B. Libert, N. McCullagh, and J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryption from bilinear maps," in Proc. Asiacrypt, 2005, pp. 515-532.
-
(2005)
Proc. Asiacrypt
, pp. 515-532
-
-
Barreto, P.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
27
-
-
33745201299
-
-
Shamus Software Ltd, Online. Available
-
Shamus Software Ltd., Miracl library. Online. Available: http:// www.shamus.ie/index.php?page=home
-
Miracl library
-
-
-
29
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
Nov
-
K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
-
(2007)
IEEE Trans. Wireless Commun
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
30
-
-
0000901529
-
Security proofs for signature schemes
-
Dec
-
D. Pointcheval and J. Stern, "Security proofs for signature schemes," J. Cryptol., vol. 13, no. 3, pp. 361-396, Dec. 2000.
-
(2000)
J. Cryptol
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
31
-
-
84949230533
-
Key agreement protocols and their security analysis
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis," in Proc. 6th IMA Int. Conf. Cryptography Coding, 1997, pp. 30-45.
-
(1997)
Proc. 6th IMA Int. Conf. Cryptography Coding
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
32
-
-
84957001208
-
Entity authentication and authenticated key transport protocols employing asymmetric techniques
-
S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proc. 5th Int. Workshop Security Protocols, 1997, vol. LNCS 1361, pp. 137-158.
-
(1997)
Proc. 5th Int. Workshop Security Protocols
, vol.LNCS 1361
, pp. 137-158
-
-
Blake-Wilson, S.1
Menezes, A.2
|