-
3
-
-
84874837458
-
A Path Towards IP-V6 Transition Strategies for Scientific Research: An Overview
-
Arshad, M. J., A. Farooq, et al. (2012). "A Path Towards IP-V6 Transition Strategies for Scientific Research: An Overview. " Life Science Journal 9(1).
-
(2012)
Life Science Journal
, vol.9
, Issue.1
-
-
Arshad, M.J.1
Farooq, A.2
-
4
-
-
35248872561
-
Cryptographically generated addresses (CGA)
-
In 2851 of LNCS
-
Aura, T. (2005). "Cryptographically generated addresses (CGA). " In Proc. 6th Information Security Conference (ISC'03) volume 2851 of LNCS: pages 29-43.
-
(2005)
Proc. 6th Information Security Conference (ISC'03)
, pp. 29-43
-
-
Aura, T.1
-
5
-
-
0037623983
-
Identitybased encryption from the Weil pairing
-
Boneh, D. and M. Franklin (2003). "Identitybased encryption from the Weil pairing. " SIAM Journal on Computing 32(3): 586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using diffie-hellman
-
in Berlin, Heidelberg, Springer-Verlag
-
Boyko, V., P. MacKenzie, et al. (2000). Provably Secure Password-Authenticated Key Exchange Using diffie-hellman. in EUROCRYPT'00: Proceedings of the 19th international conference on Theory and application of cryptographic techniques. Berlin, Heidelberg, Springer-Verlag, 2000: pp. 156-171.
-
(2000)
EUROCRYPT'00: Proceedings of the 19th international conference on Theory and application of cryptographic techniques
, pp. 156-171
-
-
Boyko, V.1
McKenzie, P.2
-
9
-
-
0038349272
-
Defending against redirect attacks in mobile IP
-
in CCS '02, (New York, NY, USA), ACM
-
Deng, R. H., J. Zhou, et al. (2002). Defending against redirect attacks in mobile IP. in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, (New York, NY, USA), ACM: 59-67.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 59-67
-
-
Deng, R.H.1
Zhou, J.2
-
10
-
-
84860509921
-
Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency
-
Fu, J.-M., J.-P. Lin, et al. (2011). "Provably Secure Password-based Three-party Key Exchange Protocol with Computation Efficiency. " Life Science Journal 8(4): 394-401.
-
(2011)
Life Science Journal
, vol.8
, Issue.4
, pp. 394-401
-
-
Fu, J.-M.1
Lin, J.-P.2
-
19
-
-
0003670190
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA
-
Perkins, C. E. (1997). Design Principles and practices, Addison-Wesley Longman Publishing Co., Inc., Boston, MA.
-
(1997)
Design Principles and practices
-
-
Perkins, C.E.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., A. Shamir, et al. (1978). "A method for obtaining digital signatures and public-key cryptosystems. " Communications of the ACM 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
-
21
-
-
84893009682
-
Distributed Systems Principles and Paradigms
-
Tanenbaum, A. S. and M. Van Steen (2003). "Distributed Systems Principles and Paradigms. " Network 3: 26.
-
(2003)
Network
, vol.3
, pp. 26
-
-
Tanenbaum, A.S.1
Steen, M.V.2
-
22
-
-
24944528733
-
-
Vogt, C., R. Bless, et al. (2005). Early Binding Updates for Mobile IPv6, in Wireless Communications and Networking Conference, 2005 IEEE. 3: 1440-1445 Vol. 1443.
-
(2005)
Early Binding Updates for Mobile IPv6, in Wireless Communications and Networking Conference, 2005 IEEE
, vol.1443
, Issue.3
, pp. 1440-1445
-
-
Vogt, C.1
Bless, R.2
|