-
1
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
20-24 April, Madrid, Spain
-
Bilge, L., Strufe, T., Balzarotti, D. and Kirda, E. (2009) 'All your contacts are belong to us: Automated identity theft attacks on social networks', WWW, ACM, 20-24 April, Madrid, Spain, pp.551-560.
-
(2009)
WWW, ACM
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
2
-
-
74049137084
-
Oblivious transfer with access control
-
ACM, 9-13 November, Chicago, IL, USA
-
Camenisch, J., Dubovitskaya, M. and Neven, G. (2009a) 'Oblivious transfer with access control', CCS, ACM, 9-13 November, Chicago, IL, USA, pp.131-140.
-
(2009)
CCS
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
3
-
-
67650686038
-
On the portability of generalized schnorr proofs
-
26-30 April, Cologne, Germany
-
Camenisch, J., Kiayias, A. and Yung, M. (2009b) 'On the portability of generalized schnorr proofs', EUROCRYPT 2009, 26-30 April, Cologne, Germany, pp.425-442.
-
(2009)
EUROCRYPT 2009
, pp. 425-442
-
-
Camenisch, J.1
Kiayias, A.2
Yung, M.3
-
4
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology - CRYPTO '97
-
Camenisch, J. and Stadler, M. (1997) 'Efficient group signature schemes for large groups', CRYPTO'97, 17-21 August, Santa Barbara, California, USA, pp.410-424. (Pubitemid 127112569)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
5
-
-
85001025766
-
Wallet databases with observers
-
Springer, 16-20 August Santa Barbara, CA, USA
-
Chaum, D. and Pedersen, T. (1993) 'Wallet databases with observers', CRYPTO'92, Springer, 16-20 August, 1992, Santa Barbara, CA, USA, pp.89-105.
-
(1992)
CRYPTO'92
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
6
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer, 21-25 August, Santa Barbara, CA, USA
-
Cramer, R., Damgård, I. and Schoenmakers, B. (1994) 'Proofs of partial knowledge and simplified design of witness hiding protocols', CRYPTO94, Springer, 21-25 August, Santa Barbara, CA, USA, pp.174-187.
-
(1994)
CRYPTO94
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
7
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
8-11 February, San Diego, CA, USA
-
Danezis, G. and Mittal, P. (2009) 'Sybilinfer: detecting sybil nodes using social networks', NDSS, 8-11 February, San Diego, CA, USA.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
IEEE
-
Du, W., Deng, J., Han, Y., Chen, S. and Varshney, P. (2004) 'A key management scheme for wireless sensor networks using deployment knowledge', INFOCOM 2004, Vol. 1, IEEE, pp.586-597.
-
(2004)
INFOCOM 2004
, vol.1
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
10
-
-
78650032056
-
A new framework for efficient password-based authenticated key exchange
-
ACM
-
Groce, A. and Katz, J. (2010) 'A new framework for efficient password-based authenticated key exchange', CCS, ACM, pp.516-525.
-
(2010)
CCS
, pp. 516-525
-
-
Groce, A.1
Katz, J.2
-
11
-
-
67650691581
-
Realizing hash-and-sign signatures under standard assumptions
-
Hohenberger, S. and Waters, B. (2009) 'Realizing hash-and-sign signatures under standard assumptions', EUROCRYPT 2009, pp.333-350.
-
(2009)
EUROCRYPT 2009
, pp. 333-350
-
-
Hohenberger, S.1
Waters, B.2
-
12
-
-
0038308135
-
A double authentication scheme to detect impersonation attack in link state routing protocols
-
IEEE
-
Huang, D., Sinha, A. and Medhi, D. (2003) 'A double authentication scheme to detect impersonation attack in link state routing protocols', ICC'03, Vol. 3, IEEE, pp.1723-1727.
-
(2003)
ICC'03
, vol.3
, pp. 1723-1727
-
-
Huang, D.1
Sinha, A.2
Medhi, D.3
-
16
-
-
33846628252
-
Efficient lookup on unstructured topologies
-
DOI 10.1109/JSAC.2007.07007
-
Morselli, R., Bhattacharjee, B., Marsh, M. and Srinivasan, A. (2007) 'Efficient lookup on unstructured topologies', Selected Areas in Communications, IEEE Journal on, Vol. 25, No. 1, pp.62-72. (Pubitemid 46180227)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.1
, pp. 62-72
-
-
Morselli, R.1
Bhattacharjee, B.2
Marsh, M.A.3
Srinivasan, A.4
-
17
-
-
2342616749
-
Random walks on complex networks
-
Noh, J. and Rieger, H. (2004) 'Random walks on complex networks', Physical Review Letters, Vol. 92, No. 11, p.118701.
-
(2004)
Physical Review Letters
, vol.92
, Issue.11
, pp. 118701
-
-
Noh, J.1
Rieger, H.2
-
18
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
DOI 10.1109/TWC.2007.060255
-
Ren, K., Lou, W., Zeng, K. and Moran, P. (2007) 'On broadcast authentication in wireless sensor networks', Wireless Communications, IEEE Transactions on, Vol. 6, No. 11, pp.4136-4144. (Pubitemid 350121763)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
19
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C. (1991) 'Efficient signature generation by smart cards', Journal of cryptology, Vol. 4, No. 3, pp.161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
20
-
-
4544241048
-
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
-
Shi, M., Shen, X. and Mark, J. (2004) 'IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks', Wireless Communications, IEEE, Vol. 11, No. 4, pp.66-75.
-
(2004)
Wireless Communications, IEEE
, vol.11
, Issue.4
, pp. 66-75
-
-
Shi, M.1
Shen, X.2
Mark, J.3
-
21
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
ACM
-
Viswanath, B., Post, A., Gummadi, K. and Mislove, A. (2010) 'An analysis of social network-based sybil defenses', SIGCOMM, ACM, pp.363-374.
-
(2010)
SIGCOMM
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.3
Mislove, A.4
-
22
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
Yu, H., Kaminsky, M., Gibbons, P. and Flaxman, A. (2006) 'Sybilguard: defending against sybil attacks via social networks', SIGCOMM, ACM, pp.267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
23
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
IEEE
-
Yu, H., Gibbons, P., Kaminsky, M. and Xiao, F. (2008) 'Sybillimit: a near-optimal social network defense against sybil attacks', S&P, IEEE, pp.3-17.
-
(2008)
S&P
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
24
-
-
84863164988
-
Authenticating strangers in fast mixing online social networks
-
5-9 December; Huston, USA
-
Zhao, x., Li, L. and Xue, G. (2011) 'Authenticating strangers in fast mixing online social networks', Globalcom'2011: IEEE Global Communications Conference, 5-9 December; Huston, USA, pp.1637-1642.
-
(2011)
Globalcom'2011: Ieee Global Communications Conference
, pp. 1637-1642
-
-
Zhao, X.1
Li, L.2
Xue, G.3
|