-
1
-
-
70249090090
-
Trust in m2m communication
-
I. Cha, Y. Shah, A. Schmidt, A. Leicher, and M. Meyerstein, "Trust in m2m communication," IEEE Veh. Technol. Mag., vol. 4, no. 3, pp. 69-75, 2009.
-
(2009)
IEEE Veh. Technol. Mag.
, vol.4
, Issue.3
, pp. 69-75
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.3
Leicher, A.4
Meyerstein, M.5
-
4
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
0010227312
-
Complexity of a determinate algorithm for the discrete logarithm
-
V. Nechaev, "Complexity of a determinate algorithm for the discrete logarithm," Mathematical Notes, vol. 55, no. 2, pp. 165-172, 1994.
-
(1994)
Mathematical Notes
, vol.55
, Issue.2
, pp. 165-172
-
-
Nechaev, V.1
-
8
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Mar
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient protocol for authenticated key agreement," Des. Codes Cryptography, vol. 28, no. 2, pp. 119-134, Mar. 2003.
-
(2003)
Des. Codes Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
9
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Jun
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptography, vol. 2, no. 2, pp. 107-125, Jun. 1992.
-
(1992)
Des. Codes Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
11
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, , vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
12
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: Authentication in ad-hoc wireless networks." in NDSS, 2002.
-
(2002)
NDSS
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
13
-
-
84894653550
-
Deliverable d4. 3.2: Final version of the network-level security architecture specification
-
S. Mirzdeh, H. Affifi, and M. Duspiva, "Deliverable d4. 3.2: Final version of the network-level security architecture specification," IST-507102 MAGNET Project, Tech. Rep., 2005.
-
(2005)
IST-507102 MAGNET Project, Tech. Rep
-
-
Mirzdeh, S.1
Affifi, H.2
Duspiva, M.3
-
14
-
-
84976825099
-
How to expose an eavesdropper
-
Apr
-
R. L. Rivest and A. Shamir, "How to expose an eavesdropper," Commun. ACM, vol. 27, no. 4, pp. 393-394, Apr. 1984.
-
(1984)
Commun ACM
, vol.27
, Issue.4
, pp. 393-394
-
-
Rivest, R.L.1
Shamir, A.2
-
16
-
-
0028288854
-
An attack on the interlock protocol when used for authentication
-
S. Bellovin and M. Merritt, "An attack on the interlock protocol when used for authentication," IEEE Trans. Inf. Theory, vol. 40, no. 1, pp. 273-275, 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 273-275
-
-
Bellovin, S.1
Merritt, M.2
-
20
-
-
24344507806
-
Electromagnetic eavesdropping risks of flat-panel displays
-
Privacy Enhancing Technologies - 4th International Workshop, PET 2004
-
M. G. Kuhn, "Electromagnetic eavesdropping risks of flat-panel displays," in Proc. 4th int. conf. on Privacy Enhancing Technologies, ser. PET'04. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 88-107. (Pubitemid 41251999)
-
(2005)
Lecture Notes in Computer Science
, vol.3424
, pp. 88-107
-
-
Kuhn, M.G.1
-
21
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
J. McCune, A. Perrig, and M. Reiter, "Seeing-is-believing: using camera phones for human-verifiable authentication," in IEEE Symp. Security and Privacy, 2005 , 2005, pp. 110-124. (Pubitemid 41543650)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
22
-
-
33751023773
-
Secure device pairing based on a visual channel
-
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan, "Secure device pairing based on a visual channel," in 2006 IEEE Symp. Security and Privacy, 2006, pp. 6-313.
-
(2006)
2006 IEEE Symp. Security and Privacy
, pp. 6-313
-
-
Saxena, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Asokan, N.4
-
23
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, p. 2004, 2004.
-
(2004)
RSA Cryptobytes
, vol.7
, pp. 2004
-
-
Gehrmann, C.1
Nyberg, K.2
-
24
-
-
71049183202
-
Universal hashing and authentication codes
-
Springer
-
D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology-CRYPTO'91. Springer, 1992, pp. 74-85.
-
(1992)
Advances in Cryptology-CRYPTO'91
, pp. 74-85
-
-
Stinson, D.R.1
-
25
-
-
34247333484
-
The ephemeral pairing problem
-
ser. Lecture Notes in Computer Science, A. Juels, Ed Springer Berlin Heidelberg
-
J.-H. Hoepman, "The ephemeral pairing problem," in Financial Cryptography, ser. Lecture Notes in Computer Science, A. Juels, Ed. Springer Berlin Heidelberg, 2004, vol. 3110, pp. 212-226.
-
(2004)
Financial Cryptography
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
26
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using human-memorable passwords," in Advances in Cryptology-EUROCRYPT 2001, ser. Lecture Notes in Computer Science, B. Pfitzmann, Ed. Springer Berlin Heidelberg, 2001, vol. 2045, pp. 475-494. (Pubitemid 33275849)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
27
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
ser. Lecture Notes in Computer Science, B. Preneel, Ed Springer Berlin Heidelberg
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Advances in Cryptology-EUROCRYPT 2000, ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin Heidelberg, 2000, vol. 1807, pp. 139-155.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
28
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
S. Vaudenay, "Secure communications over insecure channels based on short authenticated strings," in Advances in Cryptology-CRYPTO 2005, ser. Lecture Notes in Computer Science, V. Shoup, Ed. Springer Berlin Heidelberg, 2005, vol. 3621, pp. 309-326. (Pubitemid 43902121)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
29
-
-
79951833159
-
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
-
L. H. Nguyen and A. W. Roscoe, "Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey," J. Computer Security, vol. 19, no. 1, pp. 139-201, 2011.
-
(2011)
J. Computer Security
, vol.19
, Issue.1
, pp. 139-201
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
30
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
DOI 10.1109/JPROC.2005.862475
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peer-to peer wireless networks," Proc. IEEE, vol. 94, no. 2, pp. 467-478, 2006. (Pubitemid 43145998)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
32
-
-
35348851489
-
Multichannel security protocols
-
DOI 10.1109/MPRV.2007.76
-
F. L. Wong and F. Stajano, "Multichannel security protocols," IEEE Pervasive Computing, vol. 6, no. 4, pp. 31-39, 2007. (Pubitemid 47594392)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 31-39
-
-
Wong, F.L.1
Stajano, F.2
-
33
-
-
33745832230
-
SAS-based authenticated key agreement
-
DOI 10.1007/11745853-26, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
S. Pasini and S. Vaudenay, "Sas-based authenticated key agreement," in Public Key Cryptography-PKC 2006, ser. Lecture Notes in Computer Science, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds. Springer Berlin Heidelberg, 2006, vol. 3958, pp. 395-409. (Pubitemid 44029595)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958
, pp. 395-409
-
-
Pasini, S.1
Vaudenay, S.2
-
34
-
-
84945119254
-
Entity authentication and key distribution
-
ser. Lecture Notes in Computer Science, D. Stinson, Ed Springer Berlin Heidelberg
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology-CRYPTO'93, ser. Lecture Notes in Computer Science, D. Stinson, Ed. Springer Berlin Heidelberg, 1994, vol. 773, pp. 232-249.
-
(1994)
Advances in Cryptology-CRYPTO'93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
35
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ser. STOC '95. New York, NY, USA: ACM
-
-, "Provably secure session key distribution: the three party case," in Proc. 27th annu. ACM symp. Theory of computing, ser. STOC '95. New York, NY, USA: ACM, 1995, pp. 57-66.
-
(1995)
Proc. 27th Annu ACM Symp. Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
36
-
-
84885941616
-
Efficient mutual data authentication using manually authenticated strings
-
ser. Lecture Notes in Computer Science, D. Pointcheval, Y. Mu, and K. Chen, Eds Springer Berlin Heidelberg
-
S. Laur and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings," in Cryptology and Network Security, ser. Lecture Notes in Computer Science, D. Pointcheval, Y. Mu, and K. Chen, Eds. Springer Berlin Heidelberg, 2006, vol. 4301, pp. 90-107.
-
(2006)
Cryptology and Network Security
, vol.4301
, pp. 90-107
-
-
Laur, S.1
Nyberg, K.2
-
38
-
-
55949084240
-
Integrity codes: Message integrity protection and authentication over insecure channels
-
S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava, "Integrity codes: Message integrity protection and authentication over insecure channels," IEEE Trans. Dependable and Secure Computing, vol. 5, no. 4, pp. 208-223, 2008.
-
(2008)
IEEE Trans. Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 208-223
-
-
Capkun, S.1
Cagalj, M.2
Rengaswamy, R.3
Tsigkogiannis, I.4
Hubaux, J.-P.5
Srivastava, M.6
-
39
-
-
84861608109
-
Secure in-band wireless pairing
-
ser. SEC'11. Berkeley, CA, USA: USENIX Association
-
S. Gollakota, N. Ahmed, N. Zeldovich, and D. Katabi, "Secure in-band wireless pairing," in Proc. 20th USENIX conf. on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 16-16.
-
(2011)
Proc. 20th USENIX Conf. on Security
, pp. 16-16
-
-
Gollakota, S.1
Ahmed, N.2
Zeldovich, N.3
Katabi, D.4
-
40
-
-
84876402257
-
Ad hoc security associations for groups
-
ser. ESAS'06. Berlin, Heidelberg: Springer-Verlag
-
J. Valkonen, N. Asokan, and K. Nyberg, "Ad hoc security associations for groups," in Proc. 3rd European conf. on Security and Privacy in Ad-Hoc and Sensor Networks, ser. ESAS'06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 150-164.
-
(2006)
Proc. 3rd European Conf. on Security and Privacy in Ad-Hoc and Sensor Networks
, pp. 150-164
-
-
Valkonen, J.1
Asokan, N.2
Nyberg, K.3
-
41
-
-
33750291956
-
Multi-channel protocols for group key agreement in arbitrary topologies
-
ser. PERCOMW '06. Washington, DC, USA: IEEE Computer Society
-
F.-L. Wong and F. Stajano, "Multi-channel protocols for group key agreement in arbitrary topologies," in Proc. 4th annu. IEEE int. conf. Pervasive Computing and Commun. Workshops, ser. PERCOMW '06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 246.
-
(2006)
Proc. 4th Annu IEEE Int. Conf. Pervasive Computing and Commun. Workshops
, pp. 246
-
-
Wong, F.-L.1
Stajano, F.2
-
42
-
-
0031629148
-
Cliques: A new approach to group key agreement
-
M. Steiner, G. Tsudik, and M. Waidner, "Cliques: a new approach to group key agreement," in Proc. 18th Int. Conf. Distributed Computing Systems, 1998., 1998, pp. 380-387.
-
(1998)
Proc. 18th Int. Conf. Distributed Computing Systems
, vol.1998
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
44
-
-
40149095729
-
Authenticating ad hoc networks by comparison of short digests
-
Feb
-
-, "Authenticating ad hoc networks by comparison of short digests," Inf. Comput., vol. 206, no. 2-4, pp. 250-271, Feb. 2008.
-
(2008)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 250-271
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
45
-
-
79951816837
-
-
[Online] Available
-
A. W. Roscoe, "Human-centred computer security," 2005. [Online]. Available: http://www.cs.ox.ac.uk/people/bill.roscoe/publications/113. pdf
-
(2005)
Human-centred Computer Security
-
-
Roscoe, A.W.1
-
46
-
-
84555178479
-
Secure initialization of multiple constrained wireless devices for an unaided user
-
T. Perkovic, M. Cagalj, T. Mastelic, N. Saxena, and D. Begusic, "Secure initialization of multiple constrained wireless devices for an unaided user," IEEE Trans. Mobile Comput., vol. 11, no. 2, pp. 337-351, 2012.
-
(2012)
IEEE Trans. Mobile Comput.
, vol.11
, Issue.2
, pp. 337-351
-
-
Perkovic, T.1
Cagalj, M.2
Mastelic, T.3
Saxena, N.4
Begusic, D.5
-
47
-
-
78649983666
-
Sas-based group authentication and key agreement protocols
-
S. Laur and S. Pasini, "Sas-based group authentication and key agreement protocols," in In Public Key Cryptography, 2008.
-
(2008)
Public Key Cryptography
-
-
Laur, S.1
Pasini, S.2
-
48
-
-
84948991087
-
A secure and efficient conference key distribution system (extended abstract)
-
Perugia, Italy May 9-12, 1994, ser. Lecture Notes in Computer Science 950, Springer
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system (extended abstract)," in Proc. Advances in Cryptology-EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, ser. Lecture Notes in Computer Science, vol. 950. Springer, 1994, pp. 275-286.
-
(1994)
Proc. Advances in Cryptology-EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
49
-
-
15344345559
-
A secure and scalable Group Key Exchange system
-
DOI 10.1016/j.ipl.2005.01.003, PII S002001900500013X
-
-, "A secure and scalable group key exchange system," Information Processing Lett., vol. 94, no. 3, pp. 137-143, 2005. (Pubitemid 40391340)
-
(2005)
Information Processing Letters
, vol.94
, Issue.3
, pp. 137-143
-
-
Burmester, M.1
Desmedt, Y.2
-
50
-
-
33750283263
-
Contributory group key agreement protocols, revisited for mobile ad-hoc groups
-
M. Manulis, "Contributory group key agreement protocols, revisited for mobile ad-hoc groups," IEEE Int. Conf. Mobile Adhoc and Sensor Systems Conf., vol. 0, p. 818, 2005.
-
(2005)
IEEE Int. Conf. Mobile Adhoc and Sensor Systems Conf.
, vol.0
, pp. 818
-
-
Manulis, M.1
-
51
-
-
70349332824
-
Caveat eptor: A comparative study of secure device pairing methods
-
PerCom 2009
-
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, "Caveat eptor: A comparative study of secure device pairing methods," in IEEE Int. Conf. Pervasive Computing and Commun., 2009. PerCom 2009., 2009, pp. 1-10.
-
(2009)
IEEE Int. Conf. Pervasive Computing and Commun
, vol.2009
, pp. 1-10
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
52
-
-
78650034784
-
Groupthink: Usability of secure group association for wireless devices
-
ser. Ubicomp '10. New York, NY, USA: ACM
-
R. Nithyanand, N. Saxena, G. Tsudik, and E. Uzun, "Groupthink: usability of secure group association for wireless devices," in Proc. 12th ACM int. conf. on Ubiquitous computing, ser. Ubicomp '10. New York, NY, USA: ACM, 2010, pp. 331-340.
-
(2010)
Proc. 12th ACM Int. Conf. on Ubiquitous Computing
, pp. 331-340
-
-
Nithyanand, R.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
53
-
-
0018456171
-
Universal classes of hash functions
-
J. Carter and M. N. Wegman, "Universal classes of hash functions," J. Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
J. Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.1
Wegman, M.N.2
-
54
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
DOI 10.1016/0022-0000(81)90033-7
-
M. N. Wegman and J. Carter, "New hash functions and their use in authentication and set equality," J. Computer and System Sciences, vol. 22, no. 3, pp. 265-279, 1981. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman Mark, N.1
Carter J.Lawrence2
-
55
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Jan
-
M. Blum, "Coin flipping by telephone a protocol for solving impossible problems," SIGACT News, vol. 15, no. 1, pp. 23-27, Jan. 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
|