-
2
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
M. Abdalla, M. Bellare, and P. Rogaway, "The oracle Diffie-Hellman assumptions and an analysis of DHIES," in CT-RSA, pp. 143-158, 2001.
-
(2001)
CT-RSA
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
4
-
-
26444610883
-
On traveling incognito
-
Dec.
-
G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "On traveling incognito," in Proc. IEEE Workshop Mobile Syst. Appl., Dec. 1994.
-
(1994)
Proc. IEEE Workshop Mobile Syst. Appl.
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
5
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes," in Proc. EUROCRYPT 2004, pp. 268-286.
-
(2004)
Proc. EUROCRYPT
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Fairfax, ACM
-
M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," in Proc. First ACM Conf. Computer Commun. Security, pp. 62-73, Fairfax, 1993, ACM.
-
(1993)
Proc. First ACM Conf. Computer Commun. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
26444503680
-
-
European Telecommunications Standards Institute (ETSI)
-
European Telecommunications Standards Institute (ETSI), GSM 02.09: Security Aspects, 1993.
-
(1993)
GSM 02.09: Security Aspects
-
-
-
11
-
-
0021409284
-
Probabilistic encryption
-
Apr.
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. Computer Syst. Sci., vol.28, no.2, pp. 270-299, Apr. 1984.
-
(1984)
J. Computer Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
Mar.
-
K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun., vol.2, no.2, pp. 400-407, Mar. 2003.
-
(2003)
IEEE Trans. Wireless Commun.
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
13
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp. 770-771, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-771
-
-
Lamport, L.1
-
14
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
K. Lauter, "The advantages of elliptic curve cryptography for wireless security," IEEE Wireless Commun., vol.11, pp. 62-67, 2004.
-
(2004)
IEEE Wireless Commun
, vol.11
, pp. 62-67
-
-
Lauter, K.1
-
15
-
-
7244236291
-
Localised authentication for internetwork roaming across wireless LANs
-
M. Long, C. H. Wu, and J. D. Irwin, "Localised authentication for internetwork roaming across wireless LANs," IEE Proc. Commun., vol.151, no.5, pp. 496-500, 2004.
-
(2004)
IEE Proc. Commun.
, vol.151
, Issue.5
, pp. 496-500
-
-
Long, M.1
Wu, C.H.2
Irwin, J.D.3
-
18
-
-
0029451888
-
Untraceability in mobile networks
-
D. Samfat, R. Molva, and N. Asokan, "Untraceability in mobile networks," in MobiCom '95, pp. 26-36, 1995.
-
(1995)
MobiCom '95
, pp. 26-36
-
-
Samfat, D.1
Molva, R.2
Asokan, N.3
-
19
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CRYPTO 1984, Springer
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in CRYPTO 1984, vol.196, Lecture Notes Comput. Sci., pp. 47-53. Springer, 1985.
-
(1985)
Lecture Notes Comput. Sci.
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
62149084615
-
-
Jan.
-
H. Tschofenig, D. Kroeselberg, A. Pashalidis, Y. Ohba, and F. Bersani, The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method, RFC 5106, Jan. 2008.
-
(2008)
The Extensible Authentication Protocol-Internet Key Exchange Protocol Version 2 (EAP-IKEv2) Method, RFC 5106
-
-
Tschofenig, H.1
Kroeselberg, D.2
Pashalidis, A.3
Ohba, Y.4
Bersani, F.5
-
22
-
-
26444560466
-
Deposit-case attack against secure roaming
-
Springer-Verlag
-
G. Yang, D. S. Wong, and X. Deng, "Deposit-case attack against secure roaming," in Proc. 10th Australasian Conf. Inf. Security Privacy ACISP 2005, pp. 417-428. Springer-Verlag, 2005.
-
(2005)
Proc. 10th Australasian Conf. Inf. Security Privacy ACISP 2005
, pp. 417-428
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
23
-
-
35449005656
-
Anonymous and authenticated key exchange for roaming networks
-
G. Yang, D. S. Wong, and X. Deng, "Anonymous and authenticated key exchange for roaming networks," IEEE Trans. Wireless Commun., vol.6, no.9, pp. 3461-3472, 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3461-3472
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
24
-
-
44349157189
-
Formal security definition and efficient construction for roaming with a privacy-preserving extension
-
G. Yang, D. S. Wong, and X. Deng, "Formal security definition and efficient construction for roaming with a privacy-preserving extension," J. Universal Comput. Sci., vol.14, no.3, pp. 441-462, 2008.
-
(2008)
J. Universal Comput. Sci.
, vol.14
, Issue.3
, pp. 441-462
-
-
Yang, G.1
Wong, D.S.2
Deng, X.3
-
25
-
-
84868053369
-
Efficient implementation of the pairing on mobilephones using BREW
-
[Online]. Available
-
M. Yoshitomi, T. Takagi, S. Kiyomoto, and T. Tanaka, "Efficient implementation of the pairing on mobilephones using BREW," Cryptology ePrint archive, Report 2007/340, 2007. [Online]. Available: http://eprint.iacr. org/.
-
(2007)
Cryptology EPrint Archive, Report 2007/340
-
-
Yoshitomi, M.1
Takagi, T.2
Kiyomoto, S.3
Tanaka, T.4
-
26
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol.4, no.2, pp. 734-742, 2005.
-
(2005)
IEEE Trans. Wireless Commun.
, vol.4
, Issue.2
, pp. 734-742
-
-
Zhang, M.1
Fang, Y.2
-
27
-
-
55149100626
-
SLAB: Secure localized authentication and billing scheme for wireless mesh networks
-
H. Zhu, X. Lin, R. Lu, Pin-Han Ho, and X. Shen, "SLAB: secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol.17, no.10, pp. 3858-3868, 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.17
, Issue.10
, pp. 3858-3868
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
-
28
-
-
34248229210
-
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
-
R. W. Zhu, G. Yang, and D. S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices," Theor. Comput. Sci., vol.378, no.2, pp. 198-207, 2007.
-
(2007)
Theor. Comput. Sci.
, vol.378
, Issue.2
, pp. 198-207
-
-
Zhu, R.W.1
Yang, G.2
Wong, D.S.3
|