-
1
-
-
84867615498
-
Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs
-
Sarkar P, Saha A. Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. Journal of Convergence 2011; 2(1): 23-30.
-
(2011)
Journal of Convergence
, vol.2
, Issue.1
, pp. 23-30
-
-
Sarkar, P.1
Saha, A.2
-
2
-
-
84858132835
-
Hierarchical key derivation scheme for group-oriented communication systems
-
Wang S, Tsai Y, Shen C, Chen P. Hierarchical key derivation scheme for group-oriented communication systems. International Journal of Information Technology, Communications and Convergence 2010; 1(1): 66-76.
-
(2010)
International Journal of Information Technology, Communications and Convergence
, vol.1
, Issue.1
, pp. 66-76
-
-
Wang, S.1
Tsai, Y.2
Shen, C.3
Chen, P.4
-
3
-
-
84255215444
-
On secure communication in integrated heterogeneous wireless networks
-
Xie B, Kumar A, Zhao D, Reddy R, He B. On secure communication in integrated heterogeneous wireless networks. International Journal of Information Technology, Communications and Convergence 2010; 1(1): 4-23.
-
(2010)
International Journal of Information Technology, Communications and Convergence
, vol.1
, Issue.1
, pp. 4-23
-
-
Xie, B.1
Kumar, A.2
Zhao, D.3
Reddy, R.4
He, B.5
-
4
-
-
84862238713
-
An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO
-
Javed K, Saleem U, Hussain K, Sher M. An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO. Journal of Convergence 2010; 1(1): 107-112.
-
(2010)
Journal of Convergence
, vol.1
, Issue.1
, pp. 107-112
-
-
Javed, K.1
Saleem, U.2
Hussain, K.3
Sher, M.4
-
5
-
-
67651062654
-
A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6
-
Choi J, Jung S. A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6. IEICE Transactions on Communications 2008; E-91B(2): 605-608.
-
(2008)
IEICE Transactions on Communications
, vol.E91B
, Issue.2
, pp. 605-608
-
-
Choi, J.1
Jung, S.2
-
6
-
-
33744920849
-
A hash-chain based authentication scheme for fast handover in wireless network
-
LNCS, Springer-Verlag: Berlin Heidelberg
-
Hong K, Jung S, Wu S. A hash-chain based authentication scheme for fast handover in wireless network. In WISA 2005. LNCS, Vol. 3786. Springer-Verlag: Berlin Heidelberg, 2006; 96-107.
-
(2006)
WISA 2005
, vol.3786
, pp. 96-107
-
-
Hong, K.1
Jung, S.2
Wu, S.3
-
8
-
-
7244227670
-
Fast handoff scheme based on mobility prediction in public wireless LAN systems
-
Pack S, Choi Y. Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings Communications 2004; 151(5): 489-495.
-
(2004)
IEE Proceedings Communications
, vol.151
, Issue.5
, pp. 489-495
-
-
Pack, S.1
Choi, Y.2
-
9
-
-
33744909327
-
Fast authentication for inter-domain handover
-
LNCS, Springer-Verlag: Berlin Heidelberg
-
Wang H, Prasad A. Fast authentication for inter-domain handover. In ICT 2004. LNCS, Vol. 3124. Springer-Verlag: Berlin Heidelberg, 2004; 973-982.
-
(2004)
ICT 2004
, vol.3124
, pp. 973-982
-
-
Wang, H.1
Prasad, A.2
-
10
-
-
51649098802
-
A location privacy preserving authentication scheme in vehicular networks
-
IEEE Communications Society: Las Vegas
-
Zhang C, Lu R, Ho P, Chen A. A location privacy preserving authentication scheme in vehicular networks. In WCNC 2008. IEEE Communications Society: Las Vegas. 2008; 2543-2548.
-
(2008)
WCNC 2008
, pp. 2543-2548
-
-
Zhang, C.1
Lu, R.2
Ho, P.3
Chen, A.4
-
11
-
-
84947613589
-
-
802.11i Overview. IEEE.802.11-04/0123r1
-
Chaplin C, Qi E, Ptasinski H, Walker J, Li S. 802.11i Overview. IEEE.802.11-04/0123r1. http://www.drizzle.com/aboba/IEEE, February 2005.
-
(2005)
-
-
Chaplin, C.1
Qi, E.2
Ptasinski, H.3
Walker, J.4
Li, S.5
-
12
-
-
75449110407
-
A handover authentication using credentials based on chameleon hashing
-
Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communication Letters 2010; 14(1): 54-56.
-
(2010)
IEEE Communication Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
13
-
-
84959444946
-
Chameleon signatures
-
San Diego
-
Krawczyk H, Rabin T. Chameleon signatures. In NDSS 2000. San Diego, 2000; 143-154.
-
(2000)
NDSS 2000
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
14
-
-
78650029126
-
Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing
-
Yoon E, Khan M, Yoo K. Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing. IEICE Transactions on Information and Systems 2010; E93-D(12): 3400-3402.
-
(2010)
IEICE Transactions on Information and Systems
, vol.E93D
, Issue.12
, pp. 3400-3402
-
-
Yoon, E.1
Khan, M.2
Yoo, K.3
-
15
-
-
38549176356
-
SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography
-
IEEE Communications Society: Glasgow
-
Kim Y, Ren W, Jo J, Yang M, Jiang Y, Zheng J. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In ICC 2007. IEEE Communications Society: Glasgow, 2007; 1570-1575.
-
(2007)
ICC 2007
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.3
Yang, M.4
Jiang, Y.5
Zheng, J.6
-
16
-
-
84947616568
-
-
Identity based online/offline encryption scheme., Full version available at
-
Sharmila S, Sree S, Pandu C. Identity based online/offline encryption scheme. 2010, Full version available at http://eprint.iacr.org/2010/178.
-
(2010)
-
-
Sharmila, S.1
Sree, S.2
Pandu, C.3
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag: Berlin Heidelberg
-
Shamir A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-Crypto 1984. Springer-Verlag: Berlin Heidelberg, 1984; 47-53.
-
(1984)
Advances in Cryptology-Crypto 1984
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
85028913061
-
On-line/off-line digital signatures
-
LNCS 2442. Springer-Verlag: Berlin Heidelberg
-
Even S, Goldreich O, Micali S. On-line/off-line digital signatures. In Advances in Cryptology-Crypto 1989. LNCS 2442. Springer-Verlag: Berlin Heidelberg, 1989; 263-277.
-
(1989)
Advances in Cryptology-Crypto 1989
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
20
-
-
84880883264
-
Improved online/offline signature schemes
-
LNCS 2139. Springer-Verlag: Berlin Heidelberg
-
Shamir A, Tauman Y. Improved online/offline signature schemes. In Advances in Cryptology-Crypto 2001. LNCS 2139. Springer-Verlag: Berlin Heidelberg, 2001; 355-367.
-
(2001)
Advances in Cryptology-Crypto 2001
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
21
-
-
38049075273
-
Efficient generic on-line/off-line signatures without key exposure
-
LNCS 4521. Springer-Verlag: Berlin Heidelberg
-
Chen XF, Zhang FG, Susilo W, Mu Y. Efficient generic on-line/off-line signatures without key exposure. In ACNS 2007. LNCS 4521. Springer-Verlag: Berlin Heidelberg, 2007; 18-30.
-
(2007)
ACNS 2007
, pp. 18-30
-
-
Chen, X.F.1
Zhang, F.G.2
Susilo, W.3
Mu, Y.4
-
22
-
-
49849102704
-
Efficient generic on-line/off-line (threshold) signatures without key exposure
-
Chen XF, Zhang FG, Susilo W, Mu Y, Lee H, Kim K. Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences 2008; 178(21): 4192-4203.
-
(2008)
Information Sciences
, vol.178
, Issue.21
, pp. 4192-4203
-
-
Chen, X.F.1
Zhang, F.G.2
Susilo, W.3
Mu, Y.4
Lee, H.5
Kim, K.6
-
23
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
2139 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
-
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In Proceedings of Crypto 2001, Vol. 2139 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2001; 213-229.
-
(2001)
Proceedings of Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
24
-
-
54249155201
-
Identity-based online/offline encryption
-
5143 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
-
Guo F, Mu Y, Chen Z. Identity-based online/offline encryption. In FC 2008, Vol. 5143 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2008; 247-261.
-
(2008)
FC 2008
, pp. 247-261
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
25
-
-
68849125731
-
An efficient identity-based online/offline encryption scheme
-
5536 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
-
Liu J, Zhou J. An efficient identity-based online/offline encryption scheme. In ACNS 2009, Vol. 5536 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2009; 156-167.
-
(2009)
ACNS 2009
, pp. 156-167
-
-
Liu, J.1
Zhou, J.2
-
27
-
-
82955246861
-
Implementing the Tate pairing
-
2369 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
-
Galbraith S, Harrison K, Soldera D. Implementing the Tate pairing. In ANTS 2002, Vol. 2369 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2002; 324-337.
-
(2002)
ANTS 2002
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
28
-
-
0000653210
-
Selecting cryptographic key sizes
-
Lenstra A, Verheul E. Selecting cryptographic key sizes. Journal of Cryptology 2001; 14(4): 255-293.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
|