-
3
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
New York, NY, USA, ACM Press
-
N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. In MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, pages 180-189, New York, NY, USA, 2001. ACM Press.
-
(2001)
MobiCom '01: Proceedings of The 7th Annual International Conference on Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner., D.3
-
4
-
-
70249105758
-
A pervasive identification service for physical access control
-
New York, NY, USA, ACM
-
F. Buccafurri and G. Lax. A pervasive identification service for physical access control. In ICPS '08: Proceedings of the 5th international conference on Pervasive services, pages 65-68, New York, NY, USA, 2008. ACM.
-
(2008)
ICPS '08: Proceedings of the 5th International Conference on Pervasive Services
, pp. 65-68
-
-
Buccafurri, F.1
Lax., G.2
-
6
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
-
New York, NY, USA, ACM
-
C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In GIS '06: Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems, pages 171-178, New York, NY, USA, 2006. ACM.
-
(2006)
GIS '06: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu., X.3
-
7
-
-
70450227100
-
F Classes and E. M. For deterministic random Number Generators
-
2 December
-
F. Classes and E. M. for Deterministic Random Number Generators (AIS 20, Version 2.0, 2 December 1999). http://www.bsi.de/zertifiz/zert/interpr/ais20e. pdf.
-
(1999)
AIS 20, Version 2.0
-
-
-
10
-
-
52149112467
-
A table driven approach to cyclic redundancy check calculations
-
J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40-60, 1979.
-
(1979)
SIGCOMM Comput. Commun. Rev.
, vol.9
, Issue.2
, pp. 40-60
-
-
Hill, J.R.1
-
11
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst., 7(4):387-414, 2005.
-
(2005)
Knowl. Inf. Syst.
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar., K.4
-
13
-
-
4043060141
-
New remote user authentication scheme using smart cards
-
M. Kumar. New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic, 50(2):597-600, 2004.
-
(2004)
IEEE Trans. Consumer Electronic
, vol.50
, Issue.2
, pp. 597-600
-
-
Kumar, M.1
-
14
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, Nov. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport., L.1
-
15
-
-
84885223558
-
Swing & swap: User-centric approaches towards maximizing location privacy
-
New York, NY, USA, ACM
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: user-centric approaches towards maximizing location privacy. In WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, pages 19-28, New York, NY, USA, 2006. ACM.
-
(2006)
WPES '06: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society
, pp. 19-28
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran., R.4
-
16
-
-
27644489837
-
Securing credit card transactions with one-time payment scheme
-
Y. Li and X. Zhang. Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications, 4:413-426, 2005.
-
(2005)
Electronic Commerce Research and Applications
, vol.4
, pp. 413-426
-
-
Li, Y.1
Zhang, X.2
-
18
-
-
33144456748
-
Secure remote user access over insecure networks
-
M. Peyravian and C. Jeffries. Secure remote user access over insecure networks. Computer Communications, 29(5):660-667, 2006.
-
Computer Communications
, vol.29
, Issue.5
, pp. 660-667
-
-
Peyravian, M.1
Jeffries., C.2
-
21
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010-1027, 2001.
-
(2001)
IEEE Trans. on Knowl. and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
22
-
-
34547505941
-
Caravan: Providing location privacy for vanet.
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki. Caravan: Providing location privacy for vanet. In Embedded Security in Cars (ESCAR), 2005.
-
(2005)
Embedded Security in Cars (ESCAR)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
23
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
-
A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2):319-332, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
24
-
-
51349137516
-
Location anonymity in continuous location-based services
-
New York, NY, USA, , ACM.
-
T. Xu and Y. Cai. Location anonymity in continuous location-based services. In GIS '07: Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, pages 1-8, New York, NY, USA, 2007. ACM.
-
(2007)
Information Systems. in GIS '07: Proceedings of The 15th Annual ACM International Symposium on Advances In Geographic
, pp. 1-8
-
-
Xu, T.1
Cai., Y.2
|