-
1
-
-
0033343111
-
Dynamic participation in a secure conference scheme for mobile communications
-
Hwang MS,. Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans Veh Technol 1999; 48 (5): 1469-1474.
-
(1999)
IEEE Trans Veh Technol
, vol.48
, Issue.5
, pp. 1469-1474
-
-
Hwang, M.S.1
-
3
-
-
84255177653
-
A simple and efficient authentication scheme for mobile satellite communication systems
-
Lee CC, Li CT, Chang RX,. A simple and efficient authentication scheme for mobile satellite communication systems. Int J Satell Commun Networking 2012; 30 (1): 29-38.
-
(2012)
Int J Satell Commun Networking
, vol.30
, Issue.1
, pp. 29-38
-
-
Lee, C.C.1
Li, C.T.2
Chang, R.X.3
-
4
-
-
84879455064
-
-
Satway.net (Available from [Access on: 8 June 2013])
-
Satway.net. Learn about satellite and VSAT technology. 2012. (Available from: http://satway.net/understand\-VSAT\-Satellite\-Technology.html [Access on: 8 June 2013]).
-
(2012)
Learn about Satellite and VSAT Technology
-
-
-
5
-
-
0025453629
-
VSAT data networks
-
Abramson N,. VSAT data networks. Proc IEEE 1990; 78: 1267-1274.
-
(1990)
Proc IEEE
, vol.78
, pp. 1267-1274
-
-
Abramson, N.1
-
7
-
-
0027627977
-
The development of VSAT performance standards in the United States of America
-
Mitchell MW, Hedinger RA,. The development of VSAT performance standards in the United States of America. Int J Satell Commun 1993; 11 (4): 195-200.
-
(1993)
Int J Satell Commun
, vol.11
, Issue.4
, pp. 195-200
-
-
Mitchell, M.W.1
Hedinger, R.A.2
-
8
-
-
0027624950
-
VSAT standards, status and applications in europe
-
Salomon J, Bull S,. VSAT standards, status and applications in europe. Int J Satell Commun 1993; 11 (4): 181-194.
-
(1993)
Int J Satell Commun
, vol.11
, Issue.4
, pp. 181-194
-
-
Salomon, J.1
Bull, S.2
-
9
-
-
0024037372
-
VSAT networks: Architectures, protocols, and management
-
Chitre DM, McCoskey JS,. VSAT networks: architectures, protocols, and management. IEEE Commun Mag 1988; 26 (7): 28-38.
-
(1988)
IEEE Commun Mag
, vol.26
, Issue.7
, pp. 28-38
-
-
Chitre, D.M.1
McCoskey, J.S.2
-
10
-
-
0024665836
-
VSAT user network examples
-
Murthy KMS, Alan J, Barry J, Evans BG, Miller N, Mullinax R, Noble P, O'Neal B, Sanchez JJ, Seshagiri N, Shanley D, Stratigos J, Warner JW,. VSAT user network examples. IEEE Commun Mag 1989; 27 (5): 50-57.
-
(1989)
IEEE Commun Mag
, vol.27
, Issue.5
, pp. 50-57
-
-
Murthy, K.M.S.1
Alan, J.2
Barry, J.3
Evans, B.G.4
Miller, N.5
Mullinax, R.6
Noble, P.7
O'Neal, B.8
Sanchez, J.J.9
Seshagiri, N.10
Shanley, D.11
Stratigos, J.12
Warner, J.W.13
-
11
-
-
0032163788
-
Key distribution for secure VSAT satellite communications
-
Park JH, Lim SB,. Key distribution for secure VSAT satellite communications. IEEE Trans Broadcast 1998; 44 (3): 274-277.
-
(1998)
IEEE Trans Broadcast
, vol.44
, Issue.3
, pp. 274-277
-
-
Park, J.H.1
Lim, S.B.2
-
12
-
-
0347309397
-
Cryptanalysis and improvement of key distribution system for VSAT satellite communications
-
Tseng YM,. Cryptanalysis and improvement of key distribution system for VSAT satellite communications. Informatica 2002; 13 (3): 369-376.
-
(2002)
Informatica
, vol.13
, Issue.3
, pp. 369-376
-
-
Tseng, Y.M.1
-
13
-
-
0037954218
-
Security of Park-Lim key agreement schemes for VSAT satellite communications
-
Yi X, Siew CK, Sun HM, Yeh HT, Lin CL, Hwang T,. Security of Park-Lim key agreement schemes for VSAT satellite communications. IEEE Trans Veh Technol 2003; 52 (2): 465-468.
-
(2003)
IEEE Trans Veh Technol
, vol.52
, Issue.2
, pp. 465-468
-
-
Yi, X.1
Siew, C.K.2
Sun, H.M.3
Yeh, H.T.4
Lin, C.L.5
Hwang, T.6
-
14
-
-
77952689504
-
A key agreement scheme for satellite communications
-
Lee CC, Lin TC, Hwang MS,. A key agreement scheme for satellite communications. Info Tech and Contr 2010; 39 (1): 43-47.
-
(2010)
Info Tech and Contr
, vol.39
, Issue.1
, pp. 43-47
-
-
Lee, C.C.1
Lin, T.C.2
Hwang, M.S.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest RL, Shamir A, Adleman L,. A method for obtaining digital signatures and public key cryptosystems. Commun ACM 1978; 21: 120-126.
-
(1978)
Commun ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
16
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T,. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 1985; 31: 469-472.
-
(1985)
IEEE Trans Inf Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
17
-
-
80053369762
-
A new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem
-
Hong JW, Yoon SY, Park DI,. A new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem. Info Tech and Contr 2011; 40 (3): 252-259.
-
(2011)
Info Tech and Contr
, vol.40
, Issue.3
, pp. 252-259
-
-
Hong, J.W.1
Yoon, S.Y.2
Park, D.I.3
-
18
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N,. Elliptic curve cryptosystems. Math Comput 1987; 48: 208-209.
-
(1987)
Math Comput
, vol.48
, pp. 208-209
-
-
Koblitz, N.1
-
20
-
-
34548590193
-
A novel algorithm for image encryption based on mixture of chaotic maps
-
Behnia S, Akhshani A, Mahmodi H, Akhavan A,. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals 2008; 35 (2): 408-419.
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.2
, pp. 408-419
-
-
Behnia, S.1
Akhshani, A.2
Mahmodi, H.3
Akhavan, A.4
-
21
-
-
77957925386
-
Chaotic maps based on binary particle swarm optimization for feature selection
-
Chuang LY, Yang CH, Li JC,. Chaotic maps based on binary particle swarm optimization for feature selection. Appl Soft Comput 2011; 11 (1): 239-248.
-
(2011)
Appl Soft Comput
, vol.11
, Issue.1
, pp. 239-248
-
-
Chuang, L.Y.1
Yang, C.H.2
Li, J.C.3
-
22
-
-
0034599329
-
Secure digital communication based on linearly synchronized chaotic maps
-
Nan M, Wong CN, Tsang KF, Shi X,. Secure digital communication based on linearly synchronized chaotic maps. Phys Lett A 2000; 268 (1): 61-68.
-
(2000)
Phys Lett A
, vol.268
, Issue.1
, pp. 61-68
-
-
Nan, M.1
Wong, C.N.2
Tsang, K.F.3
Shi, X.4
-
23
-
-
34547662251
-
Digital watermarking based on chaotic map and reference register
-
Wu YT, Shih FY,. Digital watermarking based on chaotic map and reference register. Pattern Recognit 2007; 40 (2): 3753-3763.
-
(2007)
Pattern Recognit
, vol.40
, Issue.2
, pp. 3753-3763
-
-
Wu, Y.T.1
Shih, F.Y.2
-
24
-
-
54549093824
-
A video encryption method based on chaotic maps in DCT domain
-
Yang S, Sun S,. A video encryption method based on chaotic maps in DCT domain. Prog Nat Sci 2008; 18 (10): 1299-1304.
-
(2008)
Prog Nat Sci
, vol.18
, Issue.10
, pp. 1299-1304
-
-
Yang, S.1
Sun, S.2
-
25
-
-
84856471309
-
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
-
Yoon EJ,. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 2012; 17 (7): 2735-2740.
-
(2012)
Commun Nonlinear Sci Numer Simul
, vol.17
, Issue.7
, pp. 2735-2740
-
-
Yoon, E.J.1
-
27
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He D, Chen Y, Chen J,. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 2012; 69 (3): 1149-1157.
-
(2012)
Nonlinear Dyn
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
28
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
Lee CC, Chen CL, Wu CY, Huang SY,. An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 2012; 69 (1): 79-87.
-
(2012)
Nonlinear Dyn
, vol.69
, Issue.1
, pp. 79-87
-
-
Lee, C.C.1
Chen, C.L.2
Wu, C.Y.3
Huang, S.Y.4
-
29
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
Lee CC, Hsu CW,. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 2013; 71 (1): 201-211.
-
(2013)
Nonlinear Dyn
, vol.71
, Issue.1
, pp. 201-211
-
-
Lee, C.C.1
Hsu, C.W.2
-
30
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
Zhang L,. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 2008; 37 (3): 669-674.
-
(2008)
Chaos Solitons Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
31
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Miller V,. Uses of elliptic curves in cryptography. Lect Notes Comput Sci 1986; 218: 417-426.
-
(1986)
Lect Notes Comput Sci
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
32
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee CC, Hwang MS, Liao I,. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Ind Electron 2006; 53 (5): 1683-1687.
-
(2006)
IEEE Trans Ind Electron
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.3
-
33
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Tsai CS, Lee CC, Hwang MS,. Password authentication schemes: current status and key issues. Int J of Net Sec 2006; 3 (2): 101-115.
-
(2006)
Int J of Net Sec
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
35
-
-
67650542338
-
Time synchronization between SOKUIKI sensor and host computer using timestamps
-
Carballo A, Hara Y, Kawata H, Yoshida T, Ohya A, Yuta S,. Time synchronization between SOKUIKI sensor and host computer using timestamps. In Proceedings of IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Seoul, 2008; 261-266.
-
(2008)
Proceedings of IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Seoul
, pp. 261-266
-
-
Carballo, A.1
Hara, Y.2
Kawata, H.3
Yoshida, T.4
Ohya, A.5
Yuta, S.6
-
36
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao IE, Lee CC, Hwang MS,. A password authentication scheme over insecure networks. J Comput Syst Sci 2006; 72 (4): 727-740.
-
(2006)
J Comput Syst Sci
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
37
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura N, Patel A, Wander A, Eberle H, Shantz SC,. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect Notes Comput Sci 2004; 3156: 119-132.
-
(2004)
Lect Notes Comput Sci
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
38
-
-
84855398557
-
A fast and secure one-way hash function
-
Bakrawy L, Ghali N, Hassanien A, Kim TH,. A fast and secure one-way hash function. Comput and Info Sci 2011; 259: 85-93.
-
(2011)
Comput and Info Sci
, vol.259
, pp. 85-93
-
-
Bakrawy, L.1
Ghali, N.2
Hassanien, A.3
Kim, T.H.4
-
39
-
-
84947919014
-
New modular multiplication algorithms for fast modular exponentiation
-
Hong SM, Oh SY, Yoon H,. New modular multiplication algorithms for fast modular exponentiation. Lect Notes Comput Sci 1996; 1070: 166-177.
-
(1996)
Lect Notes Comput Sci
, vol.1070
, pp. 166-177
-
-
Hong, S.M.1
Oh, S.Y.2
Yoon, H.3
|