-
2
-
-
0034317075
-
Key agreement in ad-hoc networks
-
November
-
N. Asokan and Philip Ginzboorg. Key Agreement in Ad-hoc Networks. Computer Communications Review, 23(17):1627-1637, November 2000.
-
(2000)
Computer Communications Review
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
3
-
-
85084163516
-
Network-in-a-box: How to set up a secure wireless network in under a minute
-
San Diego, CA, August
-
Dirk Balfanz, Glenn Durfee, R. E. Grinter, D. K. Smetters, and Paul Stewart. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In 13th Usenix Security Symposium, San Diego, CA, August 2004.
-
(2004)
13th Usenix Security Symposium
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.K.4
Stewart, P.5
-
6
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, February
-
Dirk Balfanz, D. K. Smetters, Paul Stewart, and H. Chi Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02), San Diego, CA, February 2002.
-
(2002)
Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
7
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
DOI 10.1109/JPROC.2005.862475
-
Mario Čagalj, Srdjan Čapkun, and Jean-Pierre Hubaux. Key Agreement in Peer-to-Peer Wireless Networks. Proceedings of the IEEE (Special Issue on Security and Cryptography), 92(2):467-478, February 2006. (Pubitemid 43145998)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
12
-
-
33845922050
-
-
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun. Loud And Clear: Human Verifiable Authentication Based on Audio. http://www.ics.uci.edu/~ccsp/lac/LoudAndClear-files/icdcs.pdf, 2006.
-
(2006)
Loud and Clear: Human Verifiable Authentication Based on Audio
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
14
-
-
35048828834
-
Efficient passwordbased group key exchange
-
Su-Mi Lee, Jung Yeon Hwang, and Dong Hoon Lee. Efficient passwordbased group key exchange. In TrustBus, pages 191-199, 2004.
-
(2004)
TrustBus
, pp. 191-199
-
-
Lee, S.-M.1
Hwang, J.Y.2
Lee, D.H.3
-
15
-
-
35348868994
-
Efficient mutual data authentication using manually authenticated strings
-
(to appear). LNCS 4301
-
Sven Laur and Kaisa Nyberg. Efficient Mutual Data Authentication Using Manually Authenticated Strings. In Proceedings of CANS'06 (to appear), 2006. LNCS 4301.
-
(2006)
Proceedings of CANS'06
-
-
Laur, S.1
Nyberg, K.2
-
16
-
-
38149055220
-
SAS-based authenticated key agreement
-
Sylvain Pasini and Serge Vaudenay. SAS-Based Authenticated Key Agreement. In PKC 2006, 2006.
-
(2006)
PKC 2006
-
-
Pasini, S.1
Vaudenay, S.2
-
18
-
-
0029720059
-
Diffie-hellman key distribution extended to group communication
-
New York, NY, USA, ACM Press
-
Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. In CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security, pages 31-37, New York, NY, USA, 1996. ACM Press.
-
(1996)
CCS '96: Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
19
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
Serge Vaudenay. Secure Communications over insecure Channels Based on Short Authenticated Strings. In Crypto 2005, 2005.
-
(2005)
Crypto 2005
-
-
Vaudenay, S.1
-
21
-
-
84876382733
-
-
Philip Zimmermann. Zfone homepage, 2006. http://www.philzimmermann.com/ EN/zfone/index.html.
-
(2006)
Zfone Homepage
-
-
|