-
1
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communication of ACM 21 12 1978 993 999
-
(1978)
Communication of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
4
-
-
0033907037
-
Extensions to an authentication technique proposed for the global mobility network
-
DOI 10.1109/26.837039
-
L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm Extensions to an authentication technique proposed for the global mobility network IEEE Transactions on Communications 48 3 2000 373 376 (Pubitemid 30589215)
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.3
, pp. 373-376
-
-
Buttyan, L.1
Gbaguidi, C.2
Staamann, S.3
Wilhelm, U.4
-
5
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
Y. Jiang, C. Lin, X. Shen, and M. Shi Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Transactions on Wireless Communications 5 9 2006 2569 2577
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
6
-
-
19944362854
-
A new delegation-based authentication protocol for use in portable communication systems
-
DOI 10.1109/TWC.2004.840220
-
W.-B. Lee, and C.-K. Yeh A new delegation-based authentication protocol for use in portable communication systems IEEE Transactions on Wireless Communications 4 1 2005 57 64 (Pubitemid 40748808)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.1
, pp. 57-64
-
-
Lee, W.-B.1
Yeh, C.-K.2
-
7
-
-
58149108946
-
An efficient mobile authentication for wireless networks
-
C. Tang, and D.O. Wu An efficient mobile authentication for wireless networks IEEE Transactions on Wireless Communications 7 4 2008 1408 1416
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1408-1416
-
-
Tang, C.1
Wu, D.O.2
-
8
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
DOI 10.1109/TWC.2008.060802, 4471983
-
C. Tang, and D.O. Wu Mobile privacy in wireless networks revisited IEEE Transactions on Wireless Communications 7 3 2008 1035 1042 (Pubitemid 351436491)
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
9
-
-
3042783229
-
A self-encryption mechanism for authentication of roaming and teleconference services
-
K.F. Hwang, and C.C. Chang A self-encryption mechanism for authentication of roaming and teleconference services IEEE Transactions on Wireless Communications 2 2 2003 400 407
-
(2003)
IEEE Transactions on Wireless Communications
, vol.2
, Issue.2
, pp. 400-407
-
-
Hwang, K.F.1
Chang, C.C.2
-
10
-
-
77953684927
-
Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications
-
C.-I. Fan, P.-H. Ho, and R.-H. Hsu Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications EEE/ACM Transactions on Networking 18 3 2010 996 1094
-
(2010)
EEE/ACM Transactions on Networking
, vol.18
, Issue.3
, pp. 996-1094
-
-
Fan, C.-I.1
Ho, P.-H.2
Hsu, R.-H.3
-
11
-
-
67649408914
-
Enhanced delegation-based authentication protocol for PCSs
-
T.-F. Lee, S.-H. Chang, T. Hwang, and S.-K. Chong Enhanced delegation-based authentication protocol for PCSs Transactions on Wireless Communications 8 5 2009 2166 2171
-
(2009)
Transactions on Wireless Communications
, vol.8
, Issue.5
, pp. 2166-2171
-
-
Lee, T.-F.1
Chang, S.-H.2
Hwang, T.3
Chong, S.-K.4
-
12
-
-
77957706439
-
Improved delegation-based authentication protocol for secure roaming service with unlinkability
-
T.-Y. Youn, and J. Lim Improved delegation-based authentication protocol for secure roaming service with unlinkability IEEE Communications Letters 14 9 2010 791 793
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.9
, pp. 791-793
-
-
Youn, T.-Y.1
Lim, J.2
-
14
-
-
0343337504
-
Nonmalleable cryptography
-
DOI 10.1137/S0097539795291562, PII S0097539795291562
-
D. Dolev, C. Dwork, and M. Naor Nonmalleable cryptography SIAM Journal of Computing 30 2 2000 391 437 (Pubitemid 32469583)
-
(2001)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
16
-
-
84948137719
-
Extended proxy signature for smart card, in: ISW '99
-
Springer-Verlag London, UK
-
T. Okamoto, M. Tada, and E. Okamoto Extended proxy signature for smart card, in: ISW '99 Proceedings of the Second International Workshop on Information Security 1999 Springer-Verlag London, UK 247 258
-
(1999)
Proceedings of the Second International Workshop on Information Security
, pp. 247-258
-
-
Okamoto, T.1
Tada, M.2
Okamoto, E.3
-
17
-
-
38349174973
-
Designing efficient proxy signature schemes for mobile communication
-
R. Lu, D. Dong, and Z. Cao Designing efficient proxy signature schemes for mobile communication Science in China Series F: Information Science 51 2 2008 183 195
-
(2008)
Science in China Series F: Information Science
, vol.51
, Issue.2
, pp. 183-195
-
-
Lu, R.1
Dong, D.2
Cao, Z.3
-
18
-
-
84857051270
-
FIPS Pub. 197: Advanced Encryption Standard (AES)
-
FIPS Pub. 197: Advanced Encryption Standard (AES) N. I. of Science and Technology 2001
-
(2001)
N. I. of Science and Technology
-
-
-
20
-
-
0038670954
-
Software Implementation of Elliptic Curve Cryptography over Binary Fields
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
D. Hankerson, J.L. Hernandez, and A. Menezes Software implementation of elliptic curve cryptography over binary fields Proceedings CHES 2000 (LNCS 1965) 2000 Springer-Verlag 1 24 (Pubitemid 33213954)
-
(2000)
Lecture Notes in Computer Science
, Issue.1965
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
21
-
-
84949230533
-
Key Agreement Protocols and Their Security Analysis
-
Cryptography and Coding
-
S. Blake-Wilson, D. Johnson, and A. Menezes Key agreement protocols and their security analysis Proc. 6th IMA Int. Conf. Cryptography Coding 1997 30 45 (Pubitemid 128005797)
-
(1997)
Lecture Notes in Computer Science
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
23
-
-
65849441512
-
Security model and framework for information aggregation in sensor networks
-
Article 13
-
M. Manulis, and J. Schwenk Security model and framework for information aggregation in sensor networks ACM Transactions on Sensor Networks 5(2) 2009 Article 13
-
(2009)
ACM Transactions on Sensor Networks
, vol.52
-
-
Manulis, M.1
Schwenk, J.2
|