-
3
-
-
85084161952
-
PGP in Constrained Wireless Devices
-
August
-
M. Brown, D. Cheung, D. Hankerson, J. Hernandez, M. Kirkup, and A. Menezes. PGP in Constrained Wireless Devices. In 9th USENIX Security Symposium, pages 247261, August 2000.
-
(2000)
9th USENIX Security Symposium
, pp. 247261
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.4
Kirkup, M.5
Menezes, A.6
-
4
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast Security: A Taxonomy and Some Efficient Constructions. IEEE Infocom'99. Long Beach, CA, USA, Oct. 2001.
-
IEEE Infocom'99. Long Beach, CA, USA, Oct. 2001
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
0009768331
-
The Byzantine generals strike again
-
D. Dolev. The Byzantine generals strike again. In J. of Algorithms, 3:14-30, 1982.
-
(1982)
J. of Algorithms
, vol.3
, pp. 14-30
-
-
Dolev, D.1
-
7
-
-
84888077711
-
Perfectly secure message transmission revisited
-
Advances in Cryptology EUROCRYPT '02, Springer-Verlag
-
Y. Desmedt and Y. Wang. Perfectly secure message transmission revisited. In Advances in Cryptology EUROCRYPT '02, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Desmedt, Y.1
Wang, Y.2
-
8
-
-
0027341860
-
Perfectly Secure Message Transmission
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly Secure Message Transmission. JACM, (40)1, 1993, pp 17-47.
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
9
-
-
51249175955
-
Families of Finite Sets in Which no Set Is Covered by the Union of r Others
-
P. Erdos, P. Frankl, and Z. Furedi. Families of Finite Sets in Which no Set Is Covered by the Union of r Others. Israel J. Math. 51(1985), 75-89.
-
(1985)
Israel J. Math.
, vol.51
, pp. 75-89
-
-
Erdos, P.1
Frankl, P.2
Furedi, Z.3
-
11
-
-
0003640244
-
Secure communincation in minimal connectivity models
-
M. Franklin and R. Wright. Secure communincation in minimal connectivity models. In Journal of Cryptology, 13(1):9-30, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 9-30
-
-
Franklin, M.1
Wright, R.2
-
12
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, and S. Micali, How to Construct Random Functions, Journal of the ACM, vol. 33, no. 4, 1986, pp 210-217.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0027617271
-
Increasing Availability and Security of an Authentication Service
-
L. Gong. Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications, 11(5):657-662, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
14
-
-
0003597247
-
-
Internet-Draft, draft-ietf-manet-dsr-07.txt, February
-
D. Johnson, D. Maltz, Y. Hu, J.Jetcheva. The Dynamic Souce Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-07.txt, February 2002.
-
(2002)
The Dynamic Souce Routing Protocol for Mobile Ad Hoc Networks
-
-
Johnson, D.1
Maltz, D.2
Hu, Y.3
Jetcheva, J.4
-
16
-
-
85023433586
-
Generalized Linear Threshold Scheme
-
Advances in Cryptology - CRYPTO'84
-
S. Kothari. Generalized Linear Threshold Scheme. Advances in Cryptology - CRYPTO'84, LNCS 196, pp 231-241, 1984.
-
(1984)
LNCS
, vol.196
, pp. 231-241
-
-
Kothari, S.1
-
17
-
-
0035209078
-
MP-DSR: A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks
-
R. Leung, J. Liu, E. Poon, Ah-Lot. Chan, B. Li. MP-DSR: A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks. In Proc. of 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 132-141.
-
Proc. of 26th Annual IEEE Conference on Local Computer Networks (LCN 2001)
, pp. 132-141
-
-
Leung, R.1
Liu, J.2
Poon, E.3
Chan, A.-L.4
Li, B.5
-
20
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. Needham and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. In Commuinications of the ACM 21(12): 993-999, 1978.
-
(1978)
Commuinications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
21
-
-
0023247970
-
Efficient and Timely Mutual Authentication
-
D. Otway, O. Rees, Efficient and Timely Mutual Authentication, Operating Systems Review, 21 (1987), 8-10.
-
(1987)
Operating Systems Review
, vol.21
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
23
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001), Rome Italy, July 2001.
-
Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001), Rome Italy, July 2001
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
25
-
-
0000589357
-
Some New Bounds for Cover-Free Families
-
D. Stinson and R. Wei, Some New Bounds for Cover-Free Families. In J. Combin. Theory A, 90(2000), 224-234.
-
(2000)
J. Combin. Theory A
, vol.90
, pp. 224-234
-
-
Stinson, D.1
Wei, R.2
-
26
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Comm. ACM, 22(11):612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|