-
1
-
-
84871595923
-
-
IEEE.802.11-04/0123r1 February
-
Chaplin, C., Qi, E., Ptasinski, H., Walker, J., Li, S.: 802.11i overview, IEEE.802.11-04/0123r1 ( February 2005), http://www.drizzle.com/~aboba/IEEE
-
(2005)
802.11i Overview
-
-
Chaplin, C.1
Qi, E.2
Ptasinski, H.3
Walker, J.4
Li, S.5
-
2
-
-
1842665111
-
Proactive Key Distribution Using Neighbor Graphs
-
Mishra, A., Shin, M., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication Magazine 11(1), 26-36 (2004)
-
(2004)
IEEE Wireless Communication Magazine
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.3
-
3
-
-
7244227670
-
Fast Handoff Scheme based on mobility prediction in public wireless LAN systems
-
Pack, S., Choi, Y.: Fast Handoff Scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun. 151(5), 489-495 (2004)
-
(2004)
IEE Proc.-Commun.
, vol.151
, Issue.5
, pp. 489-495
-
-
Pack, S.1
Choi, Y.2
-
4
-
-
33744920849
-
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network
-
Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
-
Hong, K., Jung, S., Wu, S.F.: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 96-107. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3786
, pp. 96-107
-
-
Hong, K.1
Jung, S.2
Wu, S.F.3
-
5
-
-
33744909327
-
Fast Authentication for Inter-domain Handover
-
de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. Springer, Heidelberg
-
Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol. 3124, pp. 973-982. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3124
, pp. 973-982
-
-
Wang, H.1
Prasad, A.R.2
-
6
-
-
67651062654
-
A Secure and Efficient Handover Authentication Based on Lightweight Diffie-Hellman on Mobile Node in FMIPv6
-
Choi, J., Jung, S.: A Secure and Efficient Handover Authentication Based on Lightweight Diffie-Hellman on Mobile Node in FMIPv6. IEICE Transactions on Communications E-91B(2), 605-608 (2008)
-
(2008)
IEICE Transactions on Communications
, vol.E-91B
, Issue.2
, pp. 605-608
-
-
Choi, J.1
Jung, S.2
-
7
-
-
51649098802
-
A location Privacy Preserving Authentication Scheme in Vehicular Networks
-
IEEE Communications Society, New York
-
Zhang, C., Lu, R., Ho, P., Chen, A.: A location Privacy Preserving Authentication Scheme in Vehicular Networks. In: WCNC 2008, pp. 2543-2548. IEEE Communications Society, New York (2008)
-
(2008)
WCNC 2008
, pp. 2543-2548
-
-
Zhang, C.1
Lu, R.2
Ho, P.3
Chen, A.4
-
8
-
-
75449110407
-
A Handover Authentication Using Credentials Based on Chameleon Hashing
-
Choi, J., Jung, S.: A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communication Letters 14(1), 54-56 (2010)
-
(2010)
IEEE Communication Letters
, vol.14
, Issue.1
, pp. 54-56
-
-
Choi, J.1
Jung, S.2
-
9
-
-
84959444946
-
Chameleon Signatures
-
Krawczyk, H., Rabin, T.: Chameleon Signatures. In: NDSS 2000, pp. 143-154 (2000)
-
(2000)
NDSS 2000
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
10
-
-
78650029126
-
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
-
Yoon, E., Khan, M., Yoo, K.: Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Transactions on Information and Systems E93-D(12), 3400-3402 (2010)
-
(2010)
IEICE Transactions on Information and Systems
, vol.E93-D
, Issue.12
, pp. 3400-3402
-
-
Yoon, E.1
Khan, M.2
Yoo, K.3
-
11
-
-
38549176356
-
Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography
-
IEEE Communications Society, New York
-
Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, J., Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography. In: ICC 2007, pp. 1570-1575. IEEE Communications Society, New York (2007)
-
(2007)
ICC 2007
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.3
Yang, M.4
Jiang, J.5
-
12
-
-
84867624228
-
-
Security and Communication Networks, February 6 doi:10.1002/sec.421
-
Zhang, Y., Chen, X., Li, H., Cao, J.: Secure And Efficient Identity-Based Handoff Authentication Schemes. Security and Communication Networks, February 6 (2012), doi:10.1002/sec.421
-
Secure and Efficient Identity-Based Handoff Authentication Schemes
, pp. 2012
-
-
Zhang, Y.1
Chen, X.2
Li, H.3
Cao, J.4
-
13
-
-
38049075273
-
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 18-30. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 18-30
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Mu, Y.4
-
14
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
0010252194
-
Undeniable Signatures
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212-216. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
16
-
-
35048873387
-
Identity-Based Chameleon Hash and Applications
-
Juels, A. (ed.) FC 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 164-180. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 164-180
-
-
Ateniese, G.1
De Medeiros, B.2
-
17
-
-
35048828982
-
Chameleon Hashing Without Key Exposure
-
Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
-
Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 87-98. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
18
-
-
23944526438
-
On the Key Exposure Problem in Chameleon Hashes
-
Blundo, C., Cimato, S. (eds.) SCN 2004. Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165-179. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 165-179
-
-
Ateniese, G.1
De Medeiros, B.2
-
19
-
-
84880883264
-
Improved Online/Offline Signature Schemes
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
20
-
-
85028913061
-
On-Line/Off-Line Digital Signatures
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Even, S., Goldreich, O., Micali, S.: On-Line/Off-Line Digital Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263-275. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
21
-
-
0003157491
-
On-line/Off-line Digital Signatures
-
Even, S., Goldreich, O., Micali, S.: On-line/Off-line Digital Signatures. Journal of Cryptology 9(1), 35-67 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
22
-
-
49849102704
-
Efficient Generic On-line/Off-line (Threshold) Signatures Without Key Exposure
-
Chen, X., Zhang, F., Tian, H., Wei, B., Susilo, W., Mu, Y., Lee, H., Kim, K.: Efficient Generic On-line/Off-line (Threshold) Signatures Without Key Exposure. Information Sciences 178(21), 4192-4203 (2008)
-
(2008)
Information Sciences
, vol.178
, Issue.21
, pp. 4192-4203
-
-
Chen, X.1
Zhang, F.2
Tian, H.3
Wei, B.4
Susilo, W.5
Mu, Y.6
Lee, H.7
Kim, K.8
-
23
-
-
78149274172
-
Efficient on-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families
-
Harn, L., Hsin, W., Lin, C.: Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. The Computer Journal 53(9), 1478-1484 (2010)
-
(2010)
The Computer Journal
, vol.53
, Issue.9
, pp. 1478-1484
-
-
Harn, L.1
Hsin, W.2
Lin, C.3
-
24
-
-
35248867510
-
Efficient Identity Based Signature Schemes Based on Pairings
-
Nyberg, K., Heys, H. (eds.) SAC 2002. Springer, Heidelberg
-
Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310-324. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
25
-
-
0142002511
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security 1(1), 36-63 (2001)
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
26
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology 14(4), 255-293 (2001)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
|