-
1
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt, "Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise," in Proc. 1st ACM Conf. Comput. and Communications Security, 1993, pp. 244-250.
-
(1993)
Proc. 1st ACM Conf. Comput. and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon, "Strong password-only authenticated key exchange," ACM SIGCOMM Comput. Commun. Rev., vol. 26, no. 5, pp. 5-26, 1996.
-
(1996)
ACM SIGCOMM Comput. Commun. Rev
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
4
-
-
84937550984
-
Provably secure passwordauthenticated key exchange using Diffie-Heilman
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure passwordauthenticated key exchange using Diffie-Heilman," in Proc. Advances in Cryptology-Eurocrypt, 2000, pp. 156-171.
-
(2000)
Proc. Advances in Cryptology-Eurocrypt
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
6
-
-
33645422534
-
Entity authentication and authenticated key transport protocols employing asymmetric techniques
-
S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proc. Security Protocols Workshop, 1997, vol. 97.
-
(1997)
Proc. Security Protocols Workshop
, vol.97
-
-
Blake-Wilson, S.1
Menezes, A.2
-
8
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, no. 1, pp. 29-37, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
9
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA, USA
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong, "Talking to strangers: Authentication in ad-hoc wireless networks," in Proc. 9th Symp. on Network and Distributed Syst. Security, San Diego, CA, USA, 2002.
-
(2002)
Proc. 9th Symp. on Network and Distributed Syst. Security
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
10
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
J. M. McCune, A. Perrig, andM. K. Reiter, "Seeing-is-believing: using camera phones for human-verifiable authentication," in Proc. IEEE Symp. on Security and Privacy, 2005, pp. 110-124.
-
(2005)
Proc. IEEE Symp. on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, A.K.3
-
11
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and clear: Human-verifiable authentication based on audio," in Proc. ICDCS, Lisboa, Portugal, 2006.
-
(2006)
Proc. ICDCS, Lisboa, Portugal
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
12
-
-
78650421160
-
Gangs: Gather, authenticate' n group securely
-
ACM, New York, NY, USA
-
C.-H. O. Chen, "Gangs: Gather, authenticate' n group securely," in Proc. 4th ACM Int. Conf. Mobile Computing and Networking, ACM, New York, NY, USA, 2008, pp. 92-103.
-
(2008)
Proc. 4th ACM Int. Conf. Mobile Computing and Networking
, pp. 92-103
-
-
Chen, C.-H.O.1
-
13
-
-
19944391466
-
Using camera-equipped mobile phones for interacting with real-world objects
-
M. Rohs and B. Gfeller, "Using camera-equipped mobile phones for interacting with real-world objects," in Proc. Advances in Pervasive Computing, 2004, pp. 265-271.
-
(2004)
Proc. Advances in Pervasive Computing
, pp. 265-271
-
-
Rohs, M.1
Gfeller, B.2
-
14
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman," J. Cryptology, vol. 17, no. 4, pp. 263-276, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
17
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay, "Secure communications over insecure channels based on short authenticated strings," in Proc. Advances in Cryptology, 2005, vol. 5, pp. 309-326.
-
(2005)
Proc. Advances in Cryptology
, vol.5
, pp. 309-326
-
-
Vaudenay, S.1
-
18
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
S. Laur, N. Asokan, and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings," in Proc. 5th Int. Conf. Cryptology and Network Security, 2006, pp. 90-107.
-
(2006)
Proc. 5th Int. Conf. Cryptology and Network Security
, pp. 90-107
-
-
Laur, S.1
Asokan, N.2
Nyberg, K.3
-
19
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
S. Capkun, J. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc. 4th ACMSymp.Mobile ad hoc Networking and Computing, 2003, pp. 46-56.
-
(2003)
Proc. 4th ACMSymp.Mobile Ad Hoc Networking and Computing
, pp. 46-56
-
-
Capkun, S.1
Hubaux, J.2
Buttyan, L.3
-
20
-
-
0346265020
-
Extending Joux's protocol to multi party key agreement
-
R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement," Prog. Cryptology-INDOCRYPT, pp. 205-217, 2003.
-
(2003)
Prog. Cryptology-INDOCRYPT
, pp. 205-217
-
-
Barua, R.1
Dutta, R.2
Sarkar, P.3
-
21
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
New York, NY, USA: Springer
-
F. Z. R. Safavi-Naini and W. Susilo, "An efficient signature scheme from bilinear pairings and its applications," in Public Key Cryptography-PKC 2004. New York, NY, USA: Springer, 2004, pp. 277-290.
-
(2004)
Public Key Cryptography-PKC
, pp. 277-290
-
-
Safavi-Naini, F.Z.R.1
Susilo, W.2
-
22
-
-
84871225971
-
A revocable id-based signcryption scheme
-
T. Wu, T. Tsai, and Y. M. Tseng, "A revocable id-based signcryption scheme," J. Inf. Hiding Multimedia Signal Process., vol. 3, pp. 240-251, 2012.
-
(2012)
J. Inf. Hiding Multimedia Signal Process
, vol.3
, pp. 240-251
-
-
Wu, T.1
Tsai, T.2
Tseng, Y.M.3
-
24
-
-
84885891484
-
Generating random and pseudorandom sequences in mobile devices
-
J. Krhovjak, V. Matyas, and J. Zizkovsky, "Generating random and pseudorandom sequences in mobile devices," Security and Privacy in Mobile Inf. Commun. Syst., pp. 122-133, 2009.
-
(2009)
Security and Privacy in Mobile Inf. Commun. Syst
, pp. 122-133
-
-
Krhovjak, J.1
Matyas, V.2
Zizkovsky, J.3
-
25
-
-
84878347506
-
Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints
-
Y. Wang, W.-K. Yu, S. Wu, G. Malysa, G. E. Suh, and E. C. Kan, "Flash memory for ubiquitous hardware security functions: True random number generation and device fingerprints," in Proc. IEEE Symp. Security and Privacy, 2012, pp. 33-47.
-
(2012)
Proc. IEEE Symp. Security and Privacy
, pp. 33-47
-
-
Wang, Y.1
Yu, W.-K.2
Wu, S.3
Malysa, G.4
Suh, G.E.5
Kan, E.C.6
-
26
-
-
0036082995
-
Optical time-domain eavesdropping risks of crt displays
-
M. G. Kuhn, "Optical time-domain eavesdropping risks of crt displays," in Proc. IEEE Symp. Security and Privacy, 2002, pp. 3-18.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 3-18
-
-
Kuhn, M.G.1
-
28
-
-
38549108892
-
Usability analysis of secure pairing methods
-
E. Uzun, K. Karvonen, and N. Asokan, "Usability analysis of secure pairing methods," Financial Cryptography and Data Security, pp. 307-324, 2007.
-
(2007)
Financial Cryptography and Data Security
, pp. 307-324
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
29
-
-
60149109679
-
-
Ph.D. thesis, Carnegie Mellon Univ., Pittsburgh, PA, USA
-
Kuo C. Reduction of End User Errors in the Design of Scalable, Secure Communication 2008 Ph.D. thesis, Carnegie Mellon Univ., Pittsburgh, PA, USA
-
(2008)
Reduction of End User Errors in the Design of Scalable, Secure Communication
-
-
Kuo, C.1
-
30
-
-
84880669079
-
-
ISO/IEC 18004:2000. Information Technology-Automatic Identification and Data Capture Techniques-bar Code Symbology-QR Code 2000
-
ISO/IEC 18004:2000. Information Technology-Automatic Identification and Data Capture Techniques-bar Code Symbology-QR Code 2000.
-
-
-
-
31
-
-
84880655072
-
-
ZBar bar Code Reader Jul
-
ZBar bar Code Reader, Jul. 2011 [Online]. Available: http://zbar. sourceforge.net/
-
(2011)
-
-
|