-
1
-
-
77955047082
-
Modifications to GBAS for VDB Authentication
-
Murphy, T., Harris, M., Burns, J., "Modifications to GBAS for VDB Authentication", Navigation Systems Panel, CAT III Subgroup Meeting, July 8-10, 2008.
-
Navigation Systems Panel, CAT III Subgroup Meeting, July 8-10, 2008
-
-
Murphy, T.1
Harris, M.2
Burns, J.3
-
3
-
-
0003851399
-
-
2nd ed., Wiley, New York
-
Schneier, Bruce, "Applied cryptography: protocols, algorithms, and source code in C ," 2nd ed., Wiley, New York, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
5
-
-
70350679379
-
-
Central Security Service, January
-
National Security Agency, Central Security Service, "The Case for Elliptic Curve Cryptography" http://www.nsa.gov/business/programs/elliptic- curve.shtml, January 2009
-
(2009)
The Case for Elliptic Curve Cryptography
-
-
-
6
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
Summer/Fall
-
Perrig, A. Canetti, R., Tygar, J.D., and Song, D., "The TESLA Broadcast Authentication Protocol," CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13
-
(2002)
CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
7
-
-
77952202107
-
Signal Authentication and Integrity Schemes for Next Generation Global Navigation Satellite Systems
-
Wullems, C., Pozzobon, O., Kubik, K., "Signal Authentication and Integrity Schemes for Next Generation Global Navigation Satellite Systems," Proceedings of the European Navigation Conference GNSS, Munich, July 2005
-
Proceedings of the European Navigation Conference GNSS, Munich, July 2005
-
-
Wullems, C.1
Pozzobon, O.2
Kubik, K.3
-
8
-
-
35048826237
-
An Asymmetric Security Mechanism for Navigation Signals
-
6th Information Hiding Workshop, 23-25 May 2004, Toronto, Canada, Proceedings, Springer-Verlag
-
Kuhn, Markus G., "An Asymmetric Security Mechanism for Navigation Signals", 6th Information Hiding Workshop, 23-25 May 2004, Toronto, Canada, Proceedings, LNCS 3200, pp. 239-252, Springer-Verlag.
-
LNCS
, vol.3200
, pp. 239-252
-
-
Kuhn, M.G.1
-
9
-
-
34547980841
-
Geoencryption using Loran
-
Qiu, Di, Lo, Sherman, Enge, Per, "Geoencryption using Loran", Proceedings of the Institute of Navigation National Technical Meeting, San Diego, CA, January 2007
-
Proceedings of the Institute of Navigation National Technical Meeting, San Diego, CA, January 2007
-
-
Qiu, D.1
Lo, S.2
Enge, P.3
-
10
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Crypto 96 Proceedings, Spring Verlag, citation
-
Bellare, M., Canetti, R., and Krawczyk, H. "Keying Hash Functions for Message Authentication," Crypto 96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Spring Verlag, 1996 citation
-
(1996)
Lecture Notes in Computer Science
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
12
-
-
33751508709
-
-
National Institute of Standards and Technology, Special Publication 80057, March
-
National Institute of Standards and Technology, "Recommendation for Key Management - Part 1L General (Revised)," Special Publication 800-57, March 2007
-
(2007)
Recommendation for Key Management - Part 1L General (Revised)
-
-
|