-
1
-
-
70350772766
-
HEAP: Hop-by-hop efficient authentication protocol For mobile ad-hoc networks
-
AKBANI, R., KORKMAZ, T., AND RAJU, G. HEAP: Hop-by-hop Efficient Authentication Protocol For Mobile Ad-hoc Networks. CNS 07 (2007).
-
(2007)
CNS 07
-
-
Akbani, R.1
Korkmaz, T.2
Raju, G.3
-
2
-
-
0001989185
-
A new family of authentication protocols
-
ANDERSON, R., BERGADANO, F., CRISPO, B., LEE, J., MANIFAVAS, C., AND NEEDHAM, R. A new family of authentication protocols. Operating systems review 32, 4 (1998).
-
(1998)
Operating Systems Review
, vol.32
, pp. 4
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.4
Manifavas, C.5
Needham, R.6
-
4
-
-
84884582869
-
Chained stream authentication
-
BERGADANO, F., CAVAGNINO, D., AND CRISPO, B. Chained Stream Authentication. Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 (2000).
-
(2000)
Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000
-
-
Bergadano, F.1
Cavagnino, D.2
Crispo, B.3
-
6
-
-
0036602072
-
Hop integrity in computer networks
-
GOUDA, M. G., ELNOZAHY, E. N., HUANG, C.-T., AND MCGUIRE, T. M. Hop integrity in computer networks. IEEE/ACM Transactions on Networking 10 (2002).
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.-T.3
Mcguire, T.M.4
-
7
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-Bit CPUs
-
GURA, N., PATEL, A., WANDER, A., EBERLE, H., AND SHANTZ, S. Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs. Cryptographic Hardware and Embedded Systems: 6th International Workshop (2004).
-
(2004)
Cryptographic Hardware and Embedded Systems: 6th International Workshop
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
8
-
-
0030645662
-
Reducing the cost of security in link state routing
-
HAUSER, R., PRZYGIENDA, A., AND TSUDIK, G. Reducing the Cost of Security in Link State Routing. NDSS '97 (1997).
-
(1997)
NDSS '97
-
-
Hauser, R.1
Przygienda, A.2
Tsudik, G.3
-
9
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
HU, Y.-C., PERRIG, A., AND JOHNSON, D. Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM (2003).
-
(2003)
INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
10
-
-
0019634370
-
Password authentication with insecure communication
-
LAMPORT, L. Password authentication with insecure communication. Commun. ACM, 11 (1981).
-
(1981)
Commun. ACM
, pp. 11
-
-
Lamport, L.1
-
11
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
LIU, D., NING, P., ZHU, S., AND JAJODIA, S. Practical broadcast authentication in sensor networks. MobiQuitous (2005).
-
(2005)
MobiQuitous
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
12
-
-
70350750156
-
A light-weight hop-by-hop authentication protocol for mobile ad hoc networks
-
LU, B., AND POOCH, U. W. A Light-weight Hop-by-hop Authentication Protocol for Mobile Ad Hoc Networks. International Journal of Information Technology 11, 2 (2005).
-
(2005)
International Journal of Information Technology
, vol.11
, pp. 2
-
-
Lu, B.1
Pooch, U.W.2
-
13
-
-
34748887238
-
Generating strong one-way functions with cryptographic algorithm
-
MATYAS, S., MEYER, C., AND OSEAS, J. Generating strong one-way functions with cryptographic algorithm. IBM Technical Disclosure Bulletin 27, 10A (1985).
-
(1985)
IBM Technical Disclosure Bulletin
, vol.27
-
-
Matyas, S.1
Meyer, C.2
Oseas, J.3
-
14
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
MERKLE, R. C. A digital signature based on a conventional encryption function. In CRYPTO '87 (1988).
-
(1988)
CRYPTO '87
-
-
Merkle, R.C.1
-
15
-
-
0001263548
-
A certified digital signature
-
MERKLE, R. C. A certified digital signature. In CRYPTO '89 (1990).
-
(1990)
CRYPTO '89
-
-
Merkle, R.C.1
-
16
-
-
67649883905
-
Host identity protocol
-
IETF
-
MOSKOWITZ, R., NIKANDER, P., JOKELA, P., AND HENDERSON, T. Host identity protocol. RFC 5201, IETF, 2008.
-
(2008)
RFC 5201
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
17
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, J. Efficient and Secure Source Authentication for Multicast. NDSS '01 (2001).
-
(2001)
NDSS '01
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
18
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
PERRIG, A., CANETTI, R., TYGAR, D., AND SONG, D. The TESLA broadcast authentication protocol. Cryptobytes 5 (2002).
-
(2002)
Cryptobytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
20
-
-
24144433244
-
Zero common-knowledge authentication for pervasive networks
-
WEIMERSKIRCH, A., AND WESTHOFF, D. Zero Common-Knowledge Authentication for Pervasive Networks. SAC '03 (2003).
-
(2003)
SAC '03
-
-
Weimerskirch, A.1
Westhoff, D.2
-
21
-
-
70350748015
-
Reliable broadcast message authentication in wireless sensor networks
-
YAO, T., FUKUNAGA, S., AND NAKAI, T. Reliable broadcast message authentication in wireless sensor networks. In EUC Workshops (2006).
-
(2006)
EUC Workshops
-
-
Yao, T.1
Fukunaga, S.2
Nakai, T.3
-
22
-
-
17144429277
-
Statistical en-route filtering of injected false data in sensor networks
-
YE, F., LUO, H., LU, S., AND ZHANG, L. Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Journal on Selected Areas in Communications 23 (2005).
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
23
-
-
85180543368
-
Efficient protocols for signing routing messages
-
ZHANG, K. Efficient protocols for signing routing messages. NDSS '98 (1998).
-
(1998)
NDSS '98
-
-
Zhang, K.1
-
24
-
-
51349136300
-
Lightweight and compromise-resilient message authentication in sensor networks
-
ZHANG, W., SUBRAMANIAN, N., AND WANG, G. Lightweight and compromise-resilient message authentication in sensor networks. INFOCOM 2008 (2008).
-
(2008)
INFOCOM 2008
-
-
Zhang, W.1
Subramanian, N.2
Wang, G.3
-
25
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
ZHU, S., SETIA, S., JAJODIA, S., AND NING, P. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Security and Privacy (2004).
-
(2004)
Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
26
-
-
84943529186
-
LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks
-
ZHU, S., XU, S., SETIA, S., AND JAJODIA, S. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. Distributed Computing Systems Workshops, 2003 (2003).
-
(2003)
Distributed Computing Systems Workshops, 2003
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|