-
1
-
-
85008048475
-
Cross-layer optimization for wireless systems: A european research key challenge
-
Verikoukis, C., Alonso, L., Giamalis, T.: Cross-Layer Optimization for Wireless Systems: A European Research Key Challenge. IEEE Communications Magazine 43(7), 1-3 (2005)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 1-3
-
-
Verikoukis, C.1
Alonso, L.2
Giamalis, T.3
-
2
-
-
60749128298
-
MANETS: An exclusive choice between use and security?
-
Bonnefoi, P.-F., Sauveron, D., Park, J.H.: MANETS: an exclusive choice between use and security? Special Issue on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing (MUC) of COMPUTING AND INFORMATICS 27(5) (2008)
-
(2008)
Special Issue on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing (MUC) of COMPUTING and INFORMATICS
, vol.27
, Issue.5
-
-
Bonnefoi, P.-F.1
Sauveron, D.2
Park, J.H.3
-
6
-
-
0001278674
-
Complexity Estimates Depending on Condition and Round-Off Error
-
Cucker, F., Smale, S.: Complexity estimates depending on condition and round off error. Journal of the Association for Computing Machinery 46(1), 113-184 (2000) (Pubitemid 129592188)
-
(1999)
Journal of the ACM
, vol.46
, Issue.1
, pp. 113-184
-
-
Cucker, F.1
Smale, S.2
-
7
-
-
0000112683
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 4(8), 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.4
, Issue.8
, pp. 203-209
-
-
Koblitz, N.1
-
8
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
DOI 10.1145/359340.359342
-
Rivest, R., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
9
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory 39, 1639-1646 (1993)
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
10
-
-
35048833769
-
Weak fields for ECC
-
Topics in Cryptology - CT-RSA 2004
-
Menezes, A., Teske, E., Weng, A.: Weak Fields for ECC. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 366-386. Springer, Heidelberg (2004) (Pubitemid 38271232)
-
(2004)
Lecture Notes in Computer Science
, Issue.2964
, pp. 366-386
-
-
Menezes, A.1
Teske, E.2
Weng, A.3
-
13
-
-
0036867644
-
Multiparty authentication services and key agreement protocols with semi-trusted third party
-
Zheng, D., Chen, K., You, J.: Multiparty authentication services and key agreement protocols with semi-trusted third party. Journal of Computer Science and Technology archive 17(6), 749-756 (2002)
-
(2002)
Journal of Computer Science and Technology Archive
, vol.17
, Issue.6
, pp. 749-756
-
-
Zheng, D.1
Chen, K.2
You, J.3
-
14
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
April
-
Ateniese, G., Steiner, M., Tsudik, G.: New Multiparty Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Areas in Communications 18(4) (April 2000)
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, Issue.4
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
16
-
-
0034317075
-
Key agreement in ad hoc networks
-
DOI 10.1016/S0140-3664(00)00249-8
-
Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627-1637 (2000) (Pubitemid 32033563)
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
17
-
-
38049127352
-
Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks, communications
-
Cambridge, USA October
-
Askoxylakis, I.G., Kastanis, D.D., Traganitis, A.P.: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks, Communications. In: Networks and Information Security CNIS 2006, Cambridge, USA (October 2006)
-
(2006)
Networks and Information Security CNIS 2006
-
-
Askoxylakis, I.G.1
Kastanis, D.D.2
Traganitis, A.P.3
-
18
-
-
55849117389
-
A body-centered cubic method for key agreement in dynamic mobile ad hoc networks
-
Cap Esterel, France, August 25-29
-
Askoxylakis, I.G., Sauveron, D., Markantonakis, K., Tryfonas, T., Traganitis, A.: A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. In: Second International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel, France, August 25-29, pp. 193-202 (2008)
-
(2008)
Second International Conference on Emerging Security Information, Systems and Technologies
, pp. 193-202
-
-
Askoxylakis, I.G.1
Sauveron, D.2
Markantonakis, K.3
Tryfonas, T.4
Traganitis, A.5
|