-
2
-
-
33845229781
-
An efficient authentication protocol for mobile satellite communication systems
-
Chang YF, Chang CC,. An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Operating Systems Review 2005; 39 (1): 70-84.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.1
, pp. 70-84
-
-
Chang, Y.F.1
Chang, C.C.2
-
3
-
-
57849121084
-
A self-verification authentication mechanism for mobile satellite communication systems
-
Chen TH, Lee WB, Chen HB,. A self-verification authentication mechanism for mobile satellite communication systems. Comput Electr Eng 2009; 35 (1): 41-48.
-
(2009)
Comput Electr Eng
, vol.35
, Issue.1
, pp. 41-48
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
4
-
-
0031075864
-
Trends in mobile satellite technology
-
Comparetto G, Ramirez R,. Trends in mobile satellite technology. IEEE Computer 1999; 30 (2): 44-52. (Pubitemid 127556437)
-
(1997)
Computer
, vol.30
, Issue.2
, pp. 44-52
-
-
Comparetto, G.1
Ramirez, R.2
-
5
-
-
84948962858
-
Blind signatures based on discrete logarithm problem
-
In, Lecture Notes in Computer Science, Italy.
-
Camenisch J, Piveteau J, Stadler M,. Blind signatures based on discrete logarithm problem. In Advances in Cryptology, EUROCRYPT'94, Lecture Notes in Computer Science, Italy, 950, 1994; 428-432.
-
(1994)
Advances in Cryptology, EUROCRYPT'94
, vol.950
, pp. 428-432
-
-
Camenisch, J.1
Piveteau, J.2
Stadler, M.3
-
6
-
-
0017018484
-
New directions in cryptography
-
Diffie W, Hellman M,. New directions in cryptography. IEEE Trans Inf Theory 1976; 22 (6): 644-654.
-
(1976)
IEEE Trans Inf Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
7
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
Ellison C, Schneier B,. Ten risks of PKI: what you're not being told about public-key infrastructure. Computer Security Journal 2000; 16 (1): 1-7. (Pubitemid 30565287)
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison Carl1
Schneier Bruce2
-
8
-
-
1642389423
-
Next generation satellite systems for aeronautical communications
-
Ercetin O, Ball MO, Tassiulas L,. Next generation satellite systems for aeronautical communications. Int J Satell Commun Netw 2004; 22 (2): 157-179.
-
(2004)
Int J Satell Commun Netw
, vol.22
, Issue.2
, pp. 157-179
-
-
Ercetin, O.1
Ball, M.O.2
Tassiulas, L.3
-
9
-
-
0032308347
-
An overview of the IRIDIUM (R) low Earth orbit (LEO) satellite system
-
Dayton, U.S.A.
-
Fossa CE, Raines RA, Gunsch GH, Temple MA,. An overview of the IRIDIUM (R) low Earth orbit (LEO) satellite system. In Proceedings of the IEEE 1998 National Aerospace and Electronics Conference, NAECON'98, Dayton, U.S.A., 1998; 152-159.
-
(1998)
Proceedings of the IEEE 1998 National Aerospace and Electronics Conference, NAECON'98
, pp. 152-159
-
-
Fossa, C.E.1
Raines, R.A.2
Gunsch, G.H.3
Temple, M.A.4
-
10
-
-
23344445845
-
An authentication scheme for mobile satellite communication systems
-
Hwang MS, Yang CC, Shiu CY,. An authentication scheme for mobile satellite communication systems. ACM SIGOPS Operating Systems Review 2003; 37 (4): 42-47.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.4
, pp. 42-47
-
-
Hwang, M.S.1
Yang, C.C.2
Shiu, C.Y.3
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L,. Password authentication with insecure communication. Communication of ACM 1981; 24: 770-772.
-
(1981)
Communication of ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
Potlapally NR, Ravi S, Raghunathan A, Jha NK,. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans Mob Comput 2006; 5 (2): 128-143. (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
15
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
New Orleans, USA
-
Wong DS, Fuentes HH, Chan AH,. The performance measurement of cryptographic primitives on palm devices. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, USA, 2001; 92-101.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001)
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
16
-
-
34249790293
-
Cryptanalysis of robust E-mail Protocols with perfect forward secrecy
-
DOI 10.1109/LCOMM.2007.061770
-
Yoon EJ, Yoo KY,. Cryptanalysis of robust e-mail protocols with perfect forward secrecy. IEEE Communication Letters 2007; 11 (5): 372-374. (Pubitemid 46851580)
-
(2007)
IEEE Communications Letters
, vol.11
, Issue.5
, pp. 372-374
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
17
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
Zhu J, Ma J,. A new authentication scheme with anonymity for wireless environments. IEEE Transaction on Consumer Electronic 2004; 50 (1): 230-234.
-
(2004)
IEEE Transaction on Consumer Electronic
, vol.50
, Issue.1
, pp. 230-234
-
-
Zhu, J.1
Ma, J.2
-
18
-
-
15744365243
-
Improvements on the WTLS protocol to avoid denial of service attacks
-
DOI 10.1016/j.cose.2004.10.002, PII S0167404804002597
-
Zhang R, Chen K,. Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security 2005; 24 (5): 76-82. (Pubitemid 40415403)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 76-82
-
-
Zhang, R.1
Chen, K.2
-
19
-
-
0038687767
-
Efficient, DoS-resistant, secure key exchange for internet protocols
-
Aiello W, Bellovin SM, Blaze M, Ioannidis J, Reingold O, Canetti R, et al,. Efficient, DoS-resistant, secure key exchange for internet protocols. In Proceedings of the 9th ACM Conference on Computer and Communications Security. 2002; 48-58.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
-
20
-
-
84863012591
-
A new type of ID-based encryption system and its application to pay-TV systems
-
Zhao X, Zhang F,. A new type of ID-based encryption system and its application to pay-TV systems. International Journal of Network Security 2011; 13 (3): 161-166.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
, pp. 161-166
-
-
Zhao, X.1
Zhang, F.2
-
21
-
-
77956977210
-
Security and trust in digital rights management: A survey
-
Zhang Z, Pei Q, Ma J, Yang L,. Security and trust in digital rights management: a survey. International Journal of Network Security 2009; 9 (3): 247-263.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.3
, pp. 247-263
-
-
Zhang, Z.1
Pei, Q.2
Ma, J.3
Yang, L.4
-
22
-
-
65449142931
-
Evaluation of call blocking probabilities in LEO satellite networks
-
Yiltas D, Halim Zaim A,. Evaluation of call blocking probabilities in LEO satellite networks. Int J Satell Commun Netw 2009; 27 (2): 103-115.
-
(2009)
Int J Satell Commun Netw
, vol.27
, Issue.2
, pp. 103-115
-
-
Yiltas, D.1
Halim Zaim, A.2
-
23
-
-
35948951957
-
A novel QoS routing protocol for LEO and MEO satellite networks
-
Zhou Y, Sun F, Zhang B,. A novel QoS routing protocol for LEO and MEO satellite networks. Int J Satell Commun Netw 2007; 25 (6): 603-617.
-
(2007)
Int J Satell Commun Netw
, vol.25
, Issue.6
, pp. 603-617
-
-
Zhou, Y.1
Sun, F.2
Zhang, B.3
|