-
1
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Kong J., Zerfos P., Luo H., Lu S., Zhang L., Providing robust and ubiquitous security support for mobile ad-hoc networks Proceedings of the International Conference on Network Protocols (ICNP 01) 2001 251 260
-
(2001)
Proceedings of the International Conference on Network Protocols (ICNP 01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
3
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
Aziz A., Diffie W., Privacy and authentication for wireless local area networks IEEE Personal Communications, vol. 1, no. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie W., Hellman M. E., New directions in cryptography IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., Haas Z. J., Securing ad hoc networks IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
6
-
-
84883869163
-
Self securing ad hoc wireless networks
-
Lou H., Zerfos P., Kong J., Lu S., Zhang L., Self securing ad hoc wireless networks Proceedings of the 7th IEEE International Symposium on Computers and Communications (ISCC 02) 2002 567 574
-
(2002)
Proceedings of the 7th IEEE International Symposium on Computers and Communications (ISCC 02)
, pp. 567-574
-
-
Lou, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
10
-
-
84874324906
-
Identity based encryption from Weil pairing
-
New York, NY, USA Springer Lecture notes in Computer Science
-
Bonh D., Franklin M., Identity based encryption from Weil pairing Advances in Cryptology 2001 2139 New York, NY, USA Springer 213 229 Lecture notes in Computer Science
-
(2001)
Advances in Cryptology
, vol.2139
, pp. 213-229
-
-
Bonh, D.1
Franklin, M.2
-
11
-
-
18144424798
-
Localized public-key management for mobile ad hoc networks
-
Li R., Li J., Kameda H., Liu P., Localized public-key management for mobile ad hoc networks 2 Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 04) 2004 1284 1289
-
(2004)
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 04)
, vol.2
, pp. 1284-1289
-
-
Li, R.1
Li, J.2
Kameda, H.3
Liu, P.4
-
12
-
-
8344229909
-
A cluster-based security architecture for ad hoc networks
-
Bechler M., Hof H.-J., Kraft D., Pahlke F., Wolf L., A cluster-based security architecture for ad hoc networks 4 Proceedings of the 23rd IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 04) 2004 2393 2403
-
(2004)
Proceedings of the 23rd IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 04)
, vol.4
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
18
-
-
0025386404
-
A logic of authentication
-
Burrows M., Abadi M., Needham R., A logic of authentication ACM Transactions on Computer Systems, vol. 8, pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
20
-
-
34548838049
-
Public-key cryptography on the top of a needle
-
Batina L., Mentens N., Sakiyama K., Preneel B., Verbauwhede I., Public-key cryptography on the top of a needle Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 07) 2007 1831 1834
-
(2007)
Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 07)
, pp. 1831-1834
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
22
-
-
34047134550
-
An 830mW, 586kbps 1024bit RSA chip design
-
Yeh C., Hsu E. F., Cheng K. W., Wang J. S., Chang N. J., An 830mW, 586kbps 1024bit RSA chip design Proceedings of the Conference on Design, Automation and Test in Europe (DATE 06) 2006 24 29
-
(2006)
Proceedings of the Conference on Design, Automation and Test in Europe (DATE 06)
, pp. 24-29
-
-
Yeh, C.1
Hsu, E.F.2
Cheng, K.W.3
Wang, J.S.4
Chang, N.J.5
-
23
-
-
33749382575
-
-
Emerging Directions in Embedded and Ubiquitous Computing August 2006 Seoul, Korea Springer Lecture Notes in Computer Science
-
Kaps J.-P., Sunar B., Zhou X., Energy comparison of AES and SHA-1 for ubiquitous computing 4097 Emerging Directions in Embedded and Ubiquitous Computing August 2006 Seoul, Korea Springer 372 381 Lecture Notes in Computer Science
-
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
, vol.4097
, pp. 372-381
-
-
Kaps, J.-P.1
Sunar, B.2
Zhou, X.3
|