-
1
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
Bennett, C., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proc. IEEE ICCSSP (1984)
-
(1984)
Proc. IEEE ICCSSP
-
-
Bennett, C.1
Brassard, G.2
-
2
-
-
85030309636
-
Identification tokens - Or: Solving the chess grandmaster problem
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
Beth, T., Desmedt, Y.: Identification Tokens - or: Solving the Chess Grandmaster Problem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.537, pp. 169-176. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 169-176
-
-
Beth, T.1
Desmedt, Y.2
-
3
-
-
84976295016
-
Distance-bounding protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance-Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
4
-
-
63449130303
-
Multi-channel key agreement using encrypted public key exchange
-
Springer, Heidelberg, LNCS
-
Christianson, B., Li, J.: Multi-channel Key Agreement using Encrypted Public Key Exchange. In: Proc. Security Protocols Workshop 2007. LNCS, vol.5964. Springer, Heidelberg (2007)
-
(2007)
Proc. Security Protocols Workshop 2007
, vol.5964
-
-
Christianson, B.1
Li, J.2
-
5
-
-
84876367662
-
So near and yet so far: Distance- bounding attacks in wireless networks
-
Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. Springer, Heidelberg
-
Clulow, J., Hancke, G., Kuhn, M., Moore, T.: So Near and Yet So Far: Distance- Bounding Attacks in Wireless Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol.4357, pp. 83-97. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4357
, pp. 83-97
-
-
Clulow, J.1
Hancke, G.2
Kuhn, M.3
Moore, T.4
-
7
-
-
44449160378
-
Isolated proofs of knowledge and isolated zero knowledge
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Damgård, I., Nielsen, J.B., Wichs, D.: Isolated Proofs of Knowledge and Isolated Zero Knowledge. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.4965, pp. 509-526. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 509-526
-
-
Damgård, I.1
Nielsen, J.B.2
Wichs, D.3
-
8
-
-
85028745474
-
Special uses and abuses of the fiat-shamir passport protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat-Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
9
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Drimer, S., Murdoch, S.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proc. USENIX Security 2007 (2007)
-
(2007)
Proc. USENIX Security 2007
-
-
Drimer, S.1
Murdoch, S.2
-
10
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert, A.: Quantum cryptography based on Bell's theorem. Physical Review Letters 67(6), 661 (1991)
-
(1991)
Physical Review Letters
, vol.67
, Issue.6
, pp. 661
-
-
Ekert, A.1
-
11
-
-
68349138859
-
Security of proximity identification systems
-
University of Cambridge
-
Hancke, G.: Security of proximity identification systems. Tech. Rep. 752, University of Cambridge (2009)
-
(2009)
Tech. Rep. 752
-
-
Hancke, G.1
-
13
-
-
84945588227
-
Smart-its friends: A technique for users to easily establish connections between smart artifacts
-
Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. Springer, Heidelberg
-
Holmquist, L., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.2201, p. 116. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2201
, pp. 116
-
-
Holmquist, L.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.6
-
14
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Trans. Mobile Computing 8(6), 792-806 (2009)
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
17
-
-
0037144430
-
Physical one-way functions
-
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science 297(5589), 2026-2030 (2002)
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
19
-
-
77955331901
-
Understanding scam victims: Seven principles for systems security
-
University of Cambridge
-
Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Tech. rep. 754, University of Cambridge (2009)
-
(2009)
Tech. Rep. 754
-
-
Stajano, F.1
Wilson, P.2
-
20
-
-
38149095593
-
Multi-channel protocols
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. Springer, Heidelberg, See also the extended and revised version in IEEE Pervasive Computing 6(4), 31-39 (2007)
-
Wong, F., Stajano, F.: Multi-channel Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol.4631, pp. 112-127 Springer, Heidelberg (2007); See also the extended and revised version in IEEE Pervasive Computing 6(4), 31-39 (2007)
-
(2007)
LNCS
, vol.4631
, pp. 112-127
-
-
Wong, F.1
Stajano, F.2
|