-
1
-
-
33646588406
-
A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing
-
J. Warner and R. Johnston, "A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing," J. Security Admin., pp. 19-28, 2002.
-
(2002)
J. Security Admin.
, pp. 19-28
-
-
Warner, J.1
Johnston, R.2
-
2
-
-
85161666172
-
Acquisition and tracking of GIOVE-A broadcast L1/E5/E6 signals and analysis of DME/TACAN interference on receiver design
-
Geneva, Switzerland, May
-
G. X. Gao, D. Lorenzo, T. Walter, and P. Enge, "Acquisition and tracking of GIOVE-a broadcast L1/E5/E6 signals and analysis of DME/TACAN interference on receiver design," in Proc. ENC Global Navig. Satellite Syst. Conf, Geneva, Switzerland, May 2007.
-
(2007)
Proc. ENC Global Navig. Satellite Syst. Conf
-
-
Gao, G.X.1
Lorenzo, D.2
Walter, T.3
Enge, P.4
-
3
-
-
34547991357
-
Galileo GIOVE-A broadcast E5 codes and their application to acquisition and tracking
-
San Diego, California, Jan.
-
G. X. Gao, D. Lorenzo, A. Chen, S. Lo, D. Akos, T. Walter, and P. Enge, "Galileo GIOVE-a broadcast E5 codes and their application to acquisition and tracking", ION Nat. Tech. Meeting, San Diego, California, Jan. 2007.
-
(2007)
ION Nat. Tech. Meeting
-
-
Gao, G.X.1
Lorenzo, D.2
Chen, A.3
Lo, S.4
Akos, D.5
Walter, T.6
Enge, P.7
-
4
-
-
68249135733
-
Compass-M 1 broadcast codes in E2, E5b, and E6 frequency bands
-
G. X. Gao, A. Chen, S. Lo, D. Lorenzo, and P. Enge, "Compass-M 1 broadcast codes in E2, E5b, and E6 frequency bands," IEEEJ. Sel. Topics. Signal Process., vol. 3, pp. 599-612, 2009.
-
(2009)
IEEEJ. Sel. Topics. Signal Process
, vol.3
, pp. 599-612
-
-
Gao, G.X.1
Chen, A.2
Lo, S.3
Lorenzo, D.4
Enge, P.5
-
5
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
Berlin: Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes." in Proc. Advances in Cryptology-Crypto, Berlin: Springer-Verlag, 1984, pp. 47-53.
-
(1984)
Proc. Advances in Cryptology-Crypto
, pp. 47-53
-
-
Shamir, A.1
-
6
-
-
0346857377
-
An identity-based scheme providing zeroknowledge authentication and authenticated key exchange
-
Oct.
-
M. Girault and J. C. Pailles, "An identity-based scheme providing zeroknowledge authentication and authenticated key exchange," in Proc. European Symp. Research Comput. Security, Oct. 1990, pp. 173-184.
-
(1990)
Proc. European Symp. Research Comput. Security
, pp. 173-184
-
-
Girault, M.1
Pailles, J.C.2
-
7
-
-
1642383295
-
An identity-based key exchange protocol
-
C. Gunther, "An identity-based key exchange protocol." in Proc. EUROCRYPT, 1989, pp. 29-37.
-
(1989)
Proc. EUROCRYPT
, pp. 29-37
-
-
Gunther, C.1
-
8
-
-
84964242030
-
Distribution systems based on identification information
-
E. Okamoto, "Distribution systems based on identification information." In Proc. CRYPTO., vol. 293, 1987, pp. 194-202.
-
(1987)
Proc. CRYPTO.
, vol.293
, pp. 194-202
-
-
Okamoto, E.1
-
9
-
-
84942246351
-
Identity based authenticated key agreement protocols from pairings
-
L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," in Proc. IEEE Comput. Security Found Workshop, 2003, pp. 219-233.
-
(2003)
Proc. IEEE Comput. Security Found Workshop
, pp. 219-233
-
-
Chen, L.1
Kudla, C.2
-
10
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
N. McCullagh and P. S. L. M. Barreto, "A new two-party identity-based authenticated key agreement." in Proc. CT-RSA, 2005, pp. 262-274.
-
(2005)
Proc. CT-RSA
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
11
-
-
0037142442
-
Identity-based Authenticated key agreement protocol based on weil pairing
-
N. P. Smart, "Identity-based Authenticated key agreement protocol based on weil pairing," IET. Electron. Lett. vol. 38, no. 13, pp. 630-632, 2002.
-
(2002)
IET. Electron. Lett.
, vol.38
, Issue.13
, pp. 630-632
-
-
Smart, N.P.1
-
12
-
-
84937428623
-
Efficient algorithms for pairing based cryptosystems
-
P. S. L. M. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient algorithms for pairing based cryptosystems." in Proc. Advances in CryptologyCrypto, 2002, pp. 354-368.
-
(2002)
Proc. Advances in Cryptology Crypto
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
13
-
-
35048900981
-
On the selection of pairing-friendly groups
-
P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups," in Sel. Areas in Crypt.," SAC, pp. 17-25, 2003.
-
(2003)
Sel. Areas in Crypt., SAC
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
14
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols", in Proc. ACM Symp. on Theory Comput., 1998, pp. 419-428.
-
(1998)
Proc. ACM Symp. on Theory Comput.
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
15
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
16
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Springer-Verlag
-
R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Lecture Notes Comput. Sci., Springer-Verlag, vol. 2045, pp. 453-474, 2001
-
(2001)
Lecture Notes Comput. Sci.
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
17
-
-
34248229210
-
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
-
R. W. Zhu, G. Yang, and D. S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices," Theoretical Comput. Sci., pp. 198-207, 2007.
-
(2007)
Theoretical Comput. Sci.
, pp. 198-207
-
-
Zhu, R.W.1
Yang, G.2
Wong, D.S.3
-
18
-
-
0005078946
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. CRYPTO, 1993, pp. 232-249.
-
(1993)
Proc. CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
19
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Heidelberg: Springer
-
B. LaMacchia, K. Lauter, and A. Mityagin, "Stronger security of authenticated key exchange," Lecture Notes Comput. Sci., vol. 4784, Heidelberg: Springer, pp. 1-16,2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
20
-
-
70350651474
-
A new strongly secure authenticated key exchange protocol
-
Q. Cheng, C. Ma, and X. Hu, "A new strongly secure authenticated key exchange protocol," in Proc. ISA, 2009, pp. 135-144
-
(2009)
Proc. ISA
, pp. 135-144
-
-
Cheng, Q.1
Ma, C.2
Hu, X.3
-
21
-
-
74049127185
-
A new efficient and strongly secure authenticated key exchange protocol
-
Q. Cheng, G. Han, and C. Ma, "A new efficient and strongly secure authenticated key exchange protocol," in Proc. ISA, 2009, pp. 499-502.
-
(2009)
Proc. ISA
, pp. 499-502
-
-
Cheng, Q.1
Han, G.2
Ma, C.3
-
22
-
-
74049161015
-
Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem
-
Online. Available
-
H. Huang and Z. Cao. (2008). Strongly secure authenticated key exchange protocol based on computational Diffie-Hellman problem. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/500
-
(2008)
Cryptology EPrint Archive
-
-
Huang, H.1
Cao, Z.2
-
23
-
-
74049129404
-
An efficient authenticated key exchange protocol with a tight security reduction
-
Online. Available
-
J. Lee and C. S. Park. (2008). An efficient authenticated key exchange protocol with a tight security reduction. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/345.pdfl
-
(2008)
Cryptology EPrint Archive
-
-
Lee, J.1
Park, C.S.2
-
24
-
-
74049129404
-
Authenticated key exchange secure under the computational Diffie-Hellman assumption
-
Online. Available
-
J. Lee and J. H. Park. (2008). Authenticated key exchange secure under the computational Diffie-Hellman assumption. Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2008/344.pdfl
-
(2008)
Cryptology EPrint Archive
-
-
Lee, J.1
Park, J.H.2
|