-
2
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
M. Abdalla and D. Pointcheval, Simple password-based encrypted key exchange protocols, in CT-RSA, 2005, pp. 191-208.
-
(2005)
CT-RSA
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
3
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, in CRYPTO, 2000, pp. 255-270.
-
(2000)
CRYPTO
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
4
-
-
77953904148
-
Nist special publication 800-57
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Nist special publication 800-57, NIST Special Publication, vol. 800, no. 57, pp. 1-142, 2007.
-
(2007)
NIST Special Publication
, vol.800
, Issue.57
, pp. 1-142
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
5
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses, in IEEE Symposium on Security and Privacy, 2008, pp. 129-142.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
7
-
-
77958056561
-
Fast secure computation of set intersection
-
S. Jarecki and X. Liu, Fast secure computation of set intersection, in SCN, 2010, pp. 418-435.
-
(2010)
SCN
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
9
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer and H. Gellersen, Shake well before use: intuitive and secure pairing of mobile devices, IEEE Trans. Mob. Comput., vol. 8, no. 6, pp. 792-806, 2009.
-
(2009)
IEEE Trans. Mob. Comput
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
11
-
-
84855682684
-
Dont bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement
-
A. Studer, T. Passaro, and L. Bauer, Dont bump, shake on it: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement, in Proceedings of the 27th Annual Computer Security Applications Conference, ACM, 2011, pp. 333-342.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference ACM
, pp. 333-342
-
-
Studer, A.1
Passaro, T.2
Bauer, L.3
-
12
-
-
80755187823
-
An efficient user verification system via mouse movements
-
N. Zheng, A. Paloski, and H. Wang, An efficient user verification system via mouse movements, in ACM Conference on Computer and Communications Security, 2011, pp. 139-150.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 139-150
-
-
Zheng, N.1
Paloski, A.2
Wang, H.3
|