-
6
-
-
1542593353
-
Authentication and authenticated key exchange
-
Diffie, W., van Oorschot, P. C., & Wiener, M. J. (1992). Authentication and authenticated key exchange. Designs, Codes and Cryptography, 2, 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
8
-
-
74549219772
-
Two practical man in the middle attacks on bluetooth secure simple pairing and countermeasures
-
Haataja, K., & Toivanen, P. (2010). Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Transactions on Wireless Communications, 9(1), 384-392.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 384-392
-
-
Haataja, K.1
Toivanen, P.2
-
10
-
-
50649091323
-
Man in the middle attacks on bluetooth: A comparative analysis, a novel attack, and countermeasures
-
Hyppönen, K., & Haataja, K. (2008). Man-in-the-middle attacks on bluetooth: A comparative analysis, a novel attack, and countermeasures. Proceedings of IEEE international symposium on communications,coding and signal processing (ISCCSP '08) (pp. 1096-1102).
-
(2008)
Proceedings of IEEE International Symposium on Communications,coding and Signal Processing (ISCCSP '08)
, pp. 1096-1102
-
-
Hyppönen, K.1
Haataja, K.2
-
11
-
-
84955559079
-
Authenticated Multi-Party Key Agreement
-
Advances in Cryptology - ASIACRYPT '96
-
Just, M., & Vaudenay, S. (1996). Authenticated multi-party key agreement. In Advances in Cryptology- Asiacrypt '96, LNCS 1163 (pp. 36-49). (Pubitemid 126146211)
-
(1996)
Lecture Notes in Computer Science
, Issue.1163
, pp. 36-49
-
-
Just, M.1
Vaudenay, S.2
-
12
-
-
38549088818
-
Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
Kuo, C., Walker, J., & Perrig, A. (2007). Low-cost manufacturing, usability, and security: An analysis of bluetooth simple pairing and Wi-Fi protected setup. Proceedings of international conference on usable security (USEC '07) (pp. 325-340). (Pubitemid 351153065)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 325-340
-
-
Kuo, C.1
Walker, J.2
Perrig, A.3
-
13
-
-
84860647357
-
Bluetooth v2.1-A new security infrastructure and new vulnerabilities
-
Las Vegas
-
Lindell, A. (2008). Bluetooth v2.1-A new security infrastructure and new vulnerabilities. BlackHat Briefings, Las Vegas.
-
(2008)
BlackHat Briefings
-
-
Lindell, A.1
-
16
-
-
0032069870
-
Key control in key agreement protocols
-
Mitchell, C. J., Ward, M., & Wilson, P. (1998). Key control in key agreement protocols. IEE Electronics Letters, 34(10), 980-981 (Pubitemid 128560953)
-
(1998)
Electronics Letters
, vol.34
, Issue.10
, pp. 980-981
-
-
Mitchell, C.J.1
Ward, M.2
Wilson, P.3
-
17
-
-
78149281956
-
Authentication and ID-based key management protocol in pervasive environment
-
Moon, J. S., Park, J. H., Lee, D. G., & Lee, I.-Y. (2010). Authentication and ID-based key management protocol in pervasive environment. Wireless Personal Communications, 55(1), 91-103.
-
(2010)
Wireless Personal Communications
, vol.55
, Issue.1
, pp. 91-103
-
-
Moon, J.S.1
Park, J.H.2
Lee, D.G.3
Lee, I.-Y.4
-
18
-
-
59349096719
-
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
-
Ntantogian, C., & Xenakis, C. (2009). One-pass EAP-AKA authentication in 3G-WLAN integrated networks. Wireless Personal Communications, 48(4), 569-584.
-
(2009)
Wireless Personal Communications
, vol.48
, Issue.4
, pp. 569-584
-
-
Ntantogian, C.1
Xenakis, C.2
-
19
-
-
38149072454
-
Security associations in personal networks: A comparative analysis
-
Suomalainen, J., Valkonen, J., & Asokan, N. (2007). Security associations in personal networks: A comparative analysis. Proceedings of European workshop on security and privacy in ad-hoc and sensor networks (ESAS '07), LNCS 4572 (pp. 43-57).
-
(2007)
Proceedings of European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS '07), LNCS
, vol.4572
, pp. 43-57
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
20
-
-
78149283415
-
Robust deniable authentication protocol
-
Yoon, E.-J., Yoo, K.-Y., Yeo, S.-S., & Lee, C. (2010). Robust deniable authentication protocol. Wireless Personal Communications, 55(1), 81-90.
-
(2010)
Wireless Personal Communications
, vol.55
, Issue.1
, pp. 81-90
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
Yeo, S.-S.3
Lee, C.4
|