-
1
-
-
78649362825
-
Balancing revocation and storage trade-offs in secure group communication
-
Jan/Feb
-
B. Bruhadeshwar and S.S. Kulkarni, "Balancing Revocation and Storage Trade-Offs in Secure Group Communication," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 1, pp. 58-73, Jan./Feb. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 58-73
-
-
Bruhadeshwar, B.1
Kulkarni, S.S.2
-
3
-
-
70449388877
-
Self-organized authentication in mobile ad-hoc networks
-
P. Caballero-Gil and C. Hernández-Goya, "Self-Organized Authentication in Mobile Ad-Hoc Networks," J. Comm. and Networks, vol. 11, no. 5, pp. 509-517, 2009.
-
(2009)
J. Comm. and Networks
, vol.11
, Issue.5
, pp. 509-517
-
-
Caballero-Gil, P.1
Hernández-Goya, C.2
-
4
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.-Mar
-
S. Capkun, L. Buttyan, and J.P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar
-
M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Comm
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
6
-
-
33747064900
-
Public-key cryptography extensions into Kerberos
-
DOI 10.1109/MP.2002.1166623
-
I. Downnard, "Public-Key Cryptography Extensions into Kerberos," IEEE Potentials, vol. 21, no. 5, pp. 30-34, 2003. (Pubitemid 44208101)
-
(2002)
IEEE Potentials
, vol.21
, Issue.5
, pp. 30-34
-
-
Downnard, I.1
-
7
-
-
79960556311
-
Generalized digital certificate for user authentication and key establishment for secure communications
-
July
-
L. Harn and J. Ren, "Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications," IEEE Trans. Wireless Comm., vol. 10, no. 7, pp. 2372-2379, July 2011.
-
(2011)
IEEE Trans. Wireless Comm
, vol.10
, Issue.7
, pp. 2372-2379
-
-
Harn, L.1
Ren, J.2
-
8
-
-
84881127851
-
802.1x, ieee standard for local and metropolitan area networks, port-based network access control
-
IEEE CS
-
IEEE CS, "802.1X, IEEE Standard for Local and Metropolitan Area Networks, Port-Based Network Access Control," The Inst. of Electrical and Electronics Engineers, Inc., 2004.
-
(2004)
The Inst. of Electrical and Electronics Engineers, Inc
-
-
-
9
-
-
23044436725
-
Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
-
July
-
W.C. Ku, "Weaknesses and Drawbacks of a Password Authentication Scheme Using Neural Networks for Multiserver Architecture," IEEE Trans. Neural Networks, vol. 16, no. 4, pp. 1002-1005, July 2005.
-
(2005)
IEEE Trans. Neural Networks
, vol.16
, Issue.4
, pp. 1002-1005
-
-
Ku, W.C.1
-
10
-
-
49849102924
-
Ssl/tls session-aware user authentication
-
R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS Session-Aware User Authentication," Computer, vol. 41, no. 3, pp. 59-65, 2008.
-
(2008)
Computer
, vol.41
, Issue.3
, pp. 59-65
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
11
-
-
77951680448
-
Combined authentication-based multilevel access control in mobile application for dailylifeservice
-
June
-
H.A. Park, J.W. Hong, J.H. Park, J. Zhan, and D.H. Lee, "Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService," IEEE Trans. Mobile Computing, vol. 9, no. 6, pp. 824-837, June 2010.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.6
, pp. 824-837
-
-
Park, H.A.1
Hong, J.W.2
Park, J.H.3
Zhan, J.4
Lee, D.H.5
-
12
-
-
4344567712
-
Kerberos assisted authentication in mobile ad-hoc networks
-
A.A. Pirzada and C. McDonald, "Kerberos Assisted Authentication in Mobile Ad-Hoc Networks," Proc. 27th Australasian Computer Science Conf. (ACSC), vol. 26, no. 1, pp. 41-46, 2004.
-
(2004)
Proc. 27th Australasian Computer Science Conf. (ACSC)
, vol.26
, Issue.1
, pp. 41-46
-
-
Pirzada, A.A.1
McDonald, C.2
-
13
-
-
70350230005
-
Multi-user broadcast authentication in wireless sensor networks
-
Oct
-
K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-User Broadcast Authentication in Wireless Sensor Networks," IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 4554-4564, Oct. 2009.
-
(2009)
IEEE Trans. Vehicular Technology
, vol.58
, Issue.8
, pp. 4554-4564
-
-
Ren, K.1
Yu, S.2
Lou, W.3
Zhang, Y.4
-
14
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
78650326704
-
Survey of security services on group communications
-
Dec
-
P. Sakarindr and N. Ansari, "Survey of Security Services on Group Communications," IET Information Security vol. 4, no. 4, pp. 258-272, Dec. 2010.
-
(2010)
IET Information Security
, vol.4
, Issue.4
, pp. 258-272
-
-
Sakarindr, P.1
Ansari, N.2
-
16
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
12844275960
-
Password memorability and security: Empirical results
-
DOI 10.1109/MSP.2004.81
-
J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy Magazine, vol. 2, no. 5, pp. 25-31, Sept./Oct. 2004. (Pubitemid 40168623)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Alan, B.2
Anderson, R.3
Grant, A.4
|