-
1
-
-
0001853125
-
The computer for the 21st century
-
of Bessel functions Phil. Trans. Roy. Soc. London A247 529-551, Apr. 1955
-
M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, pp. 66-75, 1991of Bessel functions," Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, Apr. 1955.
-
(1991)
Scientific American
, vol.265
, pp. 66-75
-
-
Weiser, M.1
-
2
-
-
51149103920
-
Ubiquitous access control and policy management in personal networks
-
July
-
D. M. Kyriazanos, G. I. Stassinopoulos and N. R. Prasad, "Ubiquitous Access Control and Policy Management in Personal Networks," Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on , vol., no., pp.1-6, July 2006.
-
(2006)
Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on
, pp. 1-6
-
-
Kyriazanos, D.M.1
Stassinopoulos, G.I.2
Prasad, N.R.3
-
5
-
-
80052096133
-
A novel mutual authentication scheme for Internet of Things
-
26-29 June
-
G. Zhao, X. Si, J. Wang, X. Long and T. Hu, "A novel mutual authentication scheme for Internet of Things," Modelling, Identification and Control (ICMIC), Proceedings of 2011 IEEE International Conference on , vol., no., pp.563-566, 26-29 June 2011
-
(2011)
Modelling, Identification and Control (ICMIC), Proceedings of 2011 IEEE International Conference on
, pp. 563-566
-
-
Zhao, G.1
Si, X.2
Wang, J.3
Long, X.4
Hu, T.5
-
8
-
-
33745453101
-
Ad hoc network security: Peer identification and authentication using signal properties
-
15-17 June
-
T. Suen, A.. Yasinsac, "Ad hoc network security: peer identification and authentication using signal properties," Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC , vol., no., pp. 432-433, 15-17 June 2005.
-
(2005)
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
, pp. 432-433
-
-
Suen, T.1
Yasinsac, A.2
-
9
-
-
0034590150
-
A novel authentication scheme for ad hoc networks
-
L. Venkatraman, D.P. Agrawal, "A novel authentication scheme for ad hoc networks," Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE , vol.3, no., pp.1268-1273 vol.3, 2000.
-
(2000)
Wirelxess Communications and Networking Conference, 2000. WCNC. 2000 IEEE
, vol.3
, pp. 1268-1273
-
-
Venkatraman, L.1
Agrawal, D.P.2
-
12
-
-
84873445661
-
-
Avispa-a tool for Automated Validation of Internet Security Protocols
-
Avispa-a tool for Automated Validation of Internet Security Protocols. http://www.avispa-project.org.
-
-
-
-
13
-
-
0019649307
-
On the security of public key protocols
-
IEEE
-
D. Dolev and A. C.-C. Yao. On the security of public key protocols. In FOCS, pages 350-357. IEEE, 1981.
-
(1981)
FOCS
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.-C.2
-
16
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-it cpus
-
LNCS
-
N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz,Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs. In CHES 2004, Vol. 3156, LNCS, pp.119-132.
-
(2004)
CHES
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
1542356968
-
The RC5 encryption algorithm: Two years on
-
Y.L. Yin, The RC5 encryption algorithm: two years on, CryptoBytes (3) 2 (Winter 1997).
-
(1997)
CryptoBytes (3) 2 (Winter
-
-
Yin, Y.L.1
-
18
-
-
84983089516
-
-
In:Desmedt, Y(ed.), CRYPTO 1994. LNCS Springer, Heidel-verg
-
M. Bellare, J. Killan, and P.Rogaway,: The security of cipher block chaining,In:Desmedt, Y(ed.),CRYPTO 1994. LNCS, VOL.839, pp.341-358. Springer,Heidel-verg(1994)
-
(1994)
The Security of Cipher Block Chaining
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Killan, J.2
Rogaway, P.3
-
19
-
-
49949083706
-
Elliptic curve cryptography based access control in sensor networks
-
H. Wang, B. Sheng, Q. Li, Elliptic curve cryptography based access control in sensor networks, Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp.127-137 (2006).
-
(2006)
Int. J. Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
|