메뉴 건너뛰기




Volumn , Issue , 2010, Pages 708-717

Authenticating aviation augmentation system broadcasts

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77955028624     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PLANS.2010.5507223     Document Type: Conference Paper
Times cited : (41)

References (12)
  • 5
    • 70350679379 scopus 로고    scopus 로고
    • Central Security Service, January
    • National Security Agency, Central Security Service, "The Case for Elliptic Curve Cryptography" http://www.nsa.gov/business/programs/elliptic- curve.shtml, January 2009
    • (2009) The Case for Elliptic Curve Cryptography
  • 6
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA Broadcast Authentication Protocol
    • Summer/Fall
    • Perrig, A. Canetti, R., Tygar, J.D., and Song, D., "The TESLA Broadcast Authentication Protocol," CryptoBytes, 5:2, Summer/Fall 2002, pp. 2-13
    • (2002) CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 8
    • 35048826237 scopus 로고    scopus 로고
    • An Asymmetric Security Mechanism for Navigation Signals
    • 6th Information Hiding Workshop, 23-25 May 2004, Toronto, Canada, Proceedings, Springer-Verlag
    • Kuhn, Markus G., "An Asymmetric Security Mechanism for Navigation Signals", 6th Information Hiding Workshop, 23-25 May 2004, Toronto, Canada, Proceedings, LNCS 3200, pp. 239-252, Springer-Verlag.
    • LNCS , vol.3200 , pp. 239-252
    • Kuhn, M.G.1
  • 10
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Crypto 96 Proceedings, Spring Verlag, citation
    • Bellare, M., Canetti, R., and Krawczyk, H. "Keying Hash Functions for Message Authentication," Crypto 96 Proceedings, Lecture Notes in Computer Science, Vol. 1109, Spring Verlag, 1996 citation
    • (1996) Lecture Notes in Computer Science , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 12
    • 33751508709 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Special Publication 80057, March
    • National Institute of Standards and Technology, "Recommendation for Key Management - Part 1L General (Revised)," Special Publication 800-57, March 2007
    • (2007) Recommendation for Key Management - Part 1L General (Revised)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.