-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, USA
-
D. Balfanz, D. Smetters, P. Stewart and H. Wong, Talking to strangers: Authentication in ad-hoc wireless networks, in: Proceedings of the 9th Annual Symposium on Network and Distributed System Security (NDSS), San Diego, CA, USA, 2002.
-
(2002)
Proceedings of the 9th Annual Symposium on Network and Distributed System Security (NDSS)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
Lecture Notes in Computer Science, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, Vol. 773, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg, 1993, pp. 232-249.
-
(1993)
Advances in Cryptology - Crypto 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
Lecture Notes in Computer Science, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg
-
J. Bierbrauer, T. Johansson, G.A. Kabatianskii and B.J.M. Smeets, On families of hash functions via geometric codes and concatenation, in: Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, Vol. 773, D.R. Stinson, ed., Springer-Verlag, Berlin/Heidelberg, 1993, pp. 331- 342.
-
(1993)
Advances in Cryptology - Crypto 1993
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.A.3
Smeets, B.J.M.4
-
4
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
DOI 10.1109/JPROC.2005.862475
-
M. Čagalj, S. Čapkun and J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE Special Issue on Security and Cryptography, Vol. 94, A. Mazzeo, ed., IEEE, Washington, DC, USA, 2006, pp. 467-478. (Pubitemid 43145998)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
6
-
-
2342617507
-
Secret-ballot receipts: True voter-verifiable elections
-
D. Chaum, Secret-ballot receipts: true voter-verifiable elections, Security and Privacy Magazine, IEEE 2(1) (2004), 38-47.
-
(2004)
Security and Privacy Magazine, IEEE
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
7
-
-
33749000732
-
The attacker in ubiquitous computing environments: Formalising the threat model
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe and I. Zakiuddin, The attacker in ubiquitous computing environments: Formalising the threat model, in: Proceedings of the 1st Workshop on Formal Aspects in Security and Trust, IIT-CNR Technical report, 2003.
-
(2003)
Proceedings of the 1st Workshop on Formal Aspects in Security and Trust, IIT-CNR Technical report
-
-
Creese, S.J.1
Goldsmith, M.H.2
Roscoe, A.W.3
Zakiuddin, I.4
-
9
-
-
24644483295
-
Exploiting empirical engagement in authentication protocol design
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
S.J. Creese, M.H. Goldsmith, R. Harrison, A.W. Roscoe, P. Whittaker and I. Zakiuddin, Exploiting empirical engagement in authentication protocol design, in: Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005), Lecture Notes in Computer Science, Vol. 3450, D. Hutter and M. Ullmann, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 119-133. (Pubitemid 41274198)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 119-133
-
-
Creese, S.1
Goldsmith, M.2
Harrison, R.3
Roscoe, B.4
Whittaker, P.5
Zakiuddin, I.6
-
10
-
-
33751023842
-
Bootstrapping multi-party ad-hoc security
-
Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
-
S.J. Creese, M.H. Goldsmith, A.W. Roscoe and M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France, H.M. Haddad, ed., 2006, pp. 369-375. (Pubitemid 44758807)
-
(2006)
Proceedings of the ACM Symposium on Applied Computing
, vol.1
, pp. 369-375
-
-
Creese, S.1
Goldsmith, M.2
Roscoe, B.3
Xiao, M.4
-
11
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. Mitchell and K. Nyberg, Manual authentication for wireless devices, RSA Cryptobytes 7(1) (2004), 29-37.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
12
-
-
24644434353
-
Security in personal area networks
-
C.J. Mitchell, ed., IEEE London
-
C. Gehrmann and K. Nyberg, Security in personal area networks, in: Security for Mobility, C.J. Mitchell, ed., IEEE, London, 2004, pp. 191-230.
-
(2004)
Security for Mobility
, pp. 191-230
-
-
Gehrmann, C.1
Nyberg, K.2
-
13
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal
-
M.T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun, Loud and clear: Human-verifiable authentication based on audio, in: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, 2006, pp. 10-33.
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006)
, pp. 10-33
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
14
-
-
24644472550
-
Ephemeral pairing on anonymous networks
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
J.-H. Hoepman, Ephemeral pairing on anonymous networks, in: Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005), Lecture Notes in Computer Science, Vol. 3450, D. Hutter and M. Ullmann, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 101- 116. (Pubitemid 41274196)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 101-116
-
-
Hoepman, J.-H.1
-
15
-
-
34247333484
-
Ephemeral pairing problem
-
Lecture Notes in Computer Science, A. Juels, ed., Springer-Verlag, Berlin/Heidelberg
-
J.-H. Hoepman, Ephemeral pairing problem, in: Proceeding of the 8th International Conference on Financial Cryptography, Lecture Notes in Computer Science, Vol. 3110, A. Juels, ed., Springer- Verlag, Berlin/Heidelberg, 2004, pp. 212-226.
-
(2004)
Proceeding of the 8th International Conference on Financial Cryptography
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
16
-
-
79951826127
-
-
http://www.prismmodelchecker.org/.
-
-
-
-
17
-
-
79951839096
-
-
ISO/IEC 9798-6, C. Mitchell, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
-
ISO/IEC 9798-6, C. Mitchell, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer, 2003.
-
(2003)
-
-
-
18
-
-
79951819872
-
-
ISO/IEC 9798-6 (revision), L.H. Nguyen, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
-
ISO/IEC 9798-6 (revision), L.H. Nguyen, ed., Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer, 2010.
-
(2010)
-
-
-
19
-
-
0030106709
-
On the cardinality of systematic authentication codes via error-correcting codes
-
G.A. Kabatianskii, B. Smeets and T. Johansson, On the cardinality of systematic authentication codes via error-correcting codes, IEEE Transactions on Information Theory 42(2) (1996), 566-578. (Pubitemid 126770509)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.2
, pp. 566-578
-
-
Kabatianskii, G.A.1
Smects, B.2
Johansson, T.3
-
20
-
-
84991939136
-
LFSR-based hashing and authentication
-
Lecture Notes in Computer Science, Y. Desmedt, ed., Springer-Verlag, Berlin/Heidelberg
-
H. Krawczyk, LFSR-based hashing and authentication, in: Advances in Cryptology - Crypto 1994, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, ed., Springer-Verlag, Berlin/Heidelberg, 1994, pp. 129-139.
-
(1994)
Advances in Cryptology - Crypto 1994
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
21
-
-
84957367286
-
New hash functions for message authentication
-
Lecture Notes in Computer Science, L.C. Guillou and J.-J. Quisquater, eds, Springer-Verlag, Berlin/Heidelberg
-
H. Krawczyk, New hash functions for message authentication, in: Advances in Cryptology - Eurocrypt 1995, Lecture Notes in Computer Science, Vol. 921, L.C. Guillou and J.-J. Quisquater, eds, Springer-Verlag, Berlin/Heidelberg, 1995, pp. 301-310.
-
(1995)
Advances in Cryptology - Eurocrypt 1995
, vol.921
, pp. 301-310
-
-
Krawczyk, H.1
-
22
-
-
79951838481
-
-
Efficient mutual data authentication using manually authenticated strings: Extended version, Report 2005/424, Cryptology ePrint Archive
-
S. Laur, N. Asokan and K. Nyberg, Efficient mutual data authentication using manually authenticated strings: Extended version, Report 2005/424, Cryptology ePrint Archive, 2006.
-
(2006)
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
23
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
Lecture Notes in Computer Science, D. Pointcheval, ed., Springer-Verlag, Berlin/Heidelberg
-
S. Laur and K. Nyberg, Efficient mutual data authentication using manually authenticated strings, in: Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006), Lecture Notes in Computer Science, Vol. 4301, D. Pointcheval, ed., Springer-Verlag, Berlin/Heidelberg, 2006, pp. 90-107.
-
(2006)
Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006)
, vol.4301
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
24
-
-
67650132615
-
Comparison-based key exchange and the security of the numeric comparison mode in Bluetooth v2.1
-
Lecture Notes in Computer Science, M. Fischlin, ed., Springer-Verlag, Berlin/Heidelberg
-
A.Y. Lindell, Comparison-based key exchange and the security of the numeric comparison mode in Bluetooth v2.1, in: Proceedings of the Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, Lecture Notes in Computer Science, Vol. 5473, M. Fischlin, ed., Springer- Verlag, Berlin/Heidelberg, 2009, pp. 66-83.
-
(2009)
Proceedings of the Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
, vol.5473
, pp. 66-83
-
-
Lindell, A.Y.1
-
25
-
-
27544470609
-
Using camera phones to enhance human- computer interaction
-
Tokyo, Japan
-
A. Madhavapeddy, D. Scott, R. Sharp and E. Upton, Using camera phones to enhance human- computer interaction, in: Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp 2004), Tokyo, Japan, 2004, pp. 1-2.
-
(2004)
Proceedings of the 6th International Conference on Ubiquitous Computing (UbiComp 2004)
, pp. 1-2
-
-
Madhavapeddy, A.1
Scott, D.2
Sharp, R.3
Upton, E.4
-
26
-
-
0025106672
-
The computational complexity of universal hashing
-
Baltimore, MD, USA
-
Y. Mansour, N. Nisan and P. Tiwari, The computational complexity of universal hashing, in: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990, Baltimore, MD, USA, pp. 235-243.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing
, pp. 235-243
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
27
-
-
34648828586
-
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions
-
DOI 10.1049/iet-ifs:20060131
-
A. Mashatan and D.R. Stinson, Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions, IET Information Security 1(3) (2007), 111-118. (Pubitemid 47460143)
-
(2007)
IET Information Security
, vol.1
, Issue.3
, pp. 111-118
-
-
Mashatan, A.1
Stinson, D.R.2
-
28
-
-
34548146342
-
A human-verifiable authentication protocol using visible laser light
-
Vienna, Austria
-
R. Mayrhofer andM.Welch, A human-verifiable authentication protocol using visible laser light, in: Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 2007, pp. 1143-1148.
-
(2007)
Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES)
, pp. 1143-1148
-
-
Mayrhofer, R.1
Welch, M.2
-
29
-
-
61849133288
-
Seeing is believing: Using camera phones for humanverifiable authentication
-
J.M. McCune, A. Perrig and M.K. Reiter, Seeing is believing: Using camera phones for humanverifiable authentication, International Journal of Security and Networks 4(1,2) (2009), 43-56.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
30
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
31
-
-
33746074801
-
Polling with physical envelopes: A rigorous analysis of a human-centric protocol
-
DOI 10.1007/11761679-7, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
T. Moran and M. Naor, Polling with physical envelopes: A rigorous analysis of a human-centric protocol, in: Advances in Cryptology - Eurocrypt 2006, Lecture Notes in Computer Science, Vol. 4004, S. Vaudenay, ed., Springer-Verlag, Berlin/Heidelberg, 2006, pp. 88-108. (Pubitemid 44072235)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 88-108
-
-
Moran, T.1
Naor, M.2
-
33
-
-
40149095729
-
Authenticating ad-hoc networks by comparison of short digests
-
L.H. Nguyen and A.W. Roscoe, Authenticating ad-hoc networks by comparison of short digests, Information and Computation 206(2-4) (2008), 250-271.
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 250-271
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
34
-
-
79951825464
-
-
New combinatorial bounds for universal families of hash functions, Report 2009/153, Cryptology ePrint Archive
-
L.H. Nguyen and A.W. Roscoe, New combinatorial bounds for universal families of hash functions, Report 2009/153, Cryptology ePrint Archive, 2009.
-
(2009)
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
37
-
-
33745832230
-
SAS-based authenticated key agreement
-
DOI 10.1007/11745853-26, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
S. Pasini and S. Vaudenay, SAS-based authenticated key agreement, in: Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC 2006), Lecture Notes in Computer Science, Vol. 3958, M. Yung, Y. Dodis, A. Kiayias and T. Malkin, eds, Springer- Verlag, Berlin/Heidelberg, 2006, pp. 395-409. (Pubitemid 44029595)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
38
-
-
33745637238
-
An optimal non-interactive message authentication protocol
-
DOI 10.1007/11605805-18, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
S. Pasini and S. Vaudenay, An optimal non-interactive message authentication protocol, in: Proceedings of the Cryptographers' Track at the RSA Conference 2006 on Topics in Cryptology, Lecture Notes in Computer Science, Vol. 3860, D. Pointcheval, ed., Springer-Verlag, Berlin/Heidelberg, 2006, pp. 280-294. (Pubitemid 43971715)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960
, pp. 280-294
-
-
Pasini, S.1
Vaudenay, S.2
-
39
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
R. Pass, On deniability in the common reference string and random oracle model, in: Advances in Cryptology - Crypto 2003, Lecture Notes in Computer Science, Vol. 2729, D. Boneh, ed., Springer- Verlag, Berlin/Heidelberg, 2003, pp. 316-337. (Pubitemid 137636950)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 316-337
-
-
Pass, R.1
-
44
-
-
33751023773
-
Secure device pairing based on a visual channel
-
Oakland, CA, USA
-
N. Saxena, J.-E. Ekberg, K. Kostiainen and N. Asokan, Secure device pairing based on a visual channel, in: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2006, pp. 306-313.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
45
-
-
60149100977
-
-
Bluetooth Special Interest Group available at:
-
Simple Pairing Whitepaper, Bluetooth Special Interest Group, 2006, available at: www. bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6- F2CCFA26F70F/0/SimplePairing-WP-V10r00.pdf.
-
(2006)
Simple Pairing Whitepaper
-
-
-
47
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Lecture Notes in Computer Science, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg
-
F. Stajano and R. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, in: Proceedings of the 7th InternationalWorkshop on Security Protocols, Lecture Notes in Computer Science, Vol. 1796, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg, 1999, pp. 172-194.
-
(1999)
Proceedings of the 7th InternationalWorkshop on Security Protocols
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
48
-
-
84947916257
-
The cocaine auction protocol: on the power of anonymous broadcast
-
Lecture Notes in Computer Science, A. Pfitzmann, ed., Springer-, A. Pfitzmann, ed., Springer-Verlag, Berlin/Heidelberg
-
F. Stajano and R. Anderson, The cocaine auction protocol: on the power of anonymous broadcast, in: Proceedings of the 3rd International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1768, A. Pfitzmann, ed., Springer-Verlag, Berlin/Heidelberg, 2000, pp. 434-447.
-
(2000)
Proceedings of the 3rd International Workshop on Information Hiding
, vol.1768
, pp. 434-447
-
-
Stajano, F.1
Anderson, R.2
-
49
-
-
71049183202
-
Universal hashing and authentication codes
-
Lecture Notes in Computer Science, J. Feigenbaum, ed., Springer-Verlag, Berlin/Heidelberg
-
D.R. Stinson, Universal hashing and authentication codes, in: Advances in Cryptology - Crypto 1991, Lecture Notes in Computer Science, Vol. 576, J. Feigenbaum, ed., Springer-Verlag, Berlin/Heidelberg, 1992, pp. 74-85.
-
(1992)
Advances in Cryptology - Crypto 1991
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
50
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Lecture Notes in Computer Science, F. Stajano, C. Meadows, S. Capkun and T. Moore, eds, Springer-Verlag, Berlin/Heidelberg
-
J. Suomalainen, J. Valkonen and N. Asokan, Security associations in personal networks: A comparative analysis, in: Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks 2007, Lecture Notes in Computer Science, Vol. 4572, F. Stajano, C. Meadows, S. Capkun and T. Moore, eds, Springer-Verlag, Berlin/Heidelberg, 2007, pp. 43-57.
-
(2007)
Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks 2007
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
51
-
-
38549108892
-
Usability analysis of secure pairing methods
-
Lecture Notes in Computer Science, S. Dietrich and R. Dhamija, eds, Springer-Verlag, Berlin/Heidelberg
-
E. Uzun, K. Karvonen and N. Asonka, Usability analysis of secure pairing methods, in: Proceedings of the 11th International Conference on Financial Cryptography and Data Security (FC 2007) and the 1st International Workshop on Usable Security (USEC 2007), Lecture Notes in Computer Science, Vol. 4886, S. Dietrich and R. Dhamija, eds, Springer-Verlag, Berlin/Heidelberg, 2008, pp. 307-324.
-
(2008)
Proceedings of the 11th International Conference on Financial Cryptography and Data Security (FC 2007) and the 1st International Workshop on Usable Security (USEC 2007)
, vol.4886
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asonka, N.3
-
52
-
-
84876402257
-
Ad-hoc security associations for groups
-
Lecture Notes in Computer ScienceK., L. Butty, V.D. Gligor and D.Westhoff, eds, Springer-Verlag, Berlin/Heidelberg
-
J. Valkonen, N. Asokan and K. Nyberg, Ad-hoc security associations for groups, in: Proceedings of the 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, Lecture Notes in Computer Science, Vol. 4357, L. Butty, V.D. Gligor and D.Westhoff, eds, Springer-Verlag, Berlin/Heidelberg, 2006, pp. 150-164.
-
(2006)
Proceedings of the 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks
, vol.4357
, pp. 150-164
-
-
Valkonen, J.1
Asokan, N.2
Nyberg, K.3
-
53
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
S. Vaudenay, Secure communications over insecure channels based on short authenticated strings, in: Advances in Cryptology - Crypto 2005, Lecture Notes in Computer Science, Vol. 3621, V. Shoup, ed., Springer-Verlag, Berlin/Heidelberg, 2005, pp. 309-326. (Pubitemid 43902121)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
54
-
-
85020573990
-
On the design of S-Boxes
-
Lecture Notes in Computer Science, S.E., H.C. Williams, ed., Springer-Verlag, Berlin/Heidelberg
-
A.F. Webster and S.E. Tavares, On the design of S-Boxes, in: Advances in Cryptology - Crypto 1985, Lecture Notes in Computer Science, Vol. 218, H.C. Williams, ed., Springer-Verlag, Berlin/Heidelberg, 1986, pp. 523-534.
-
(1986)
Advances in Cryptology - Crypto 1985
, vol.218
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
-
55
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
DOI 10.1016/0022-0000(81)90033-7
-
M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22(3) (1981), 265-279. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman Mark, N.1
Carter J.Lawrence2
-
56
-
-
38149126229
-
Multi-channel protocols
-
Lecture Notes in Computer Science, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg
-
F.-L. Wong and F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, Lecture Notes in Computer Science, Vol. 4631, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds, Springer-Verlag, Berlin/Heidelberg, 2005, pp. 128-132.
-
(2005)
Proceedings of the 13th International Workshop on Security Protocols
, vol.4631
, pp. 128-132
-
-
Wong, F.-L.1
Stajano, F.2
|