-
2
-
-
0002181960
-
Digital multisignatures
-
H. Baker and F.C. Piper, Claredon Press
-
C. Boyd. Digital multisignatures. IMA Conference on Cryptography and Coding, H. Baker and F.C. Piper, Claredon Press, pp 241-246,1986.
-
(1986)
IMA Conference on Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
3
-
-
84943764832
-
Broadcast interactive proofs
-
Eurocrypt 91, D.W. Davies, Springer-Verlag
-
M. Burmester and Y. Desmedt. Broadcast interactive proofs. Eurocrypt 91, Lecture Notes in Computer Science 547, D.W. Davies, Springer-Verlag, pp 81-95,1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 81-95
-
-
Burmester, M.1
Desmedt, Y.2
-
4
-
-
84956862121
-
Secure communication in an unknown network using certificates
-
Advances in Cryptology Asiacrypt '99, Springer-Berlin
-
M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. Advances in Cryptology Asiacrypt '99, Lecture Notes in Computer Science 1716, Springer-Berlin, pp 274-287,1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1716
, pp. 274-287
-
-
Burmester, M.1
Desmedt, Y.2
-
7
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17-47,1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology CRYPTO '86, Springer Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology CRYPTO '86, Lecture Notes in Computer Science, Springer Verlag, 263:186-194,1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
84958676203
-
Proactive RSA
-
Crypto '97, Springer Verlag
-
Y. Frankel, P. Gemmel, P. Mackenzie and M. Yung. Proactive RSA. Crypto '97, Lecture Notes in Computer Science, Springer Verlag, pp 440-452, 1997.
-
(1997)
Lecture Notes in Computer Science
, pp. 440-452
-
-
Frankel, Y.1
Gemmel, P.2
Mackenzie, P.3
Yung, M.4
-
14
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
H. Hezberg, D. Jarecki, H. Krawzyk and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. Crypto '95, pp 339-352, 1995.
-
(1995)
Crypto '95
, pp. 339-352
-
-
Hezberg, H.1
Jarecki, D.2
Krawzyk, H.3
Yung, M.4
-
16
-
-
0034545825
-
Sending messages to mobile users in disconnected ad hoc wireless networks
-
Q. Li and D. Rus. Sending messages to mobile users in disconnected ad hoc wireless networks. In proceedings of ACM MOBICOM '00, pp 44-55, 2000.
-
(2000)
Proceedings of ACM MOBICOM '00
, pp. 44-55
-
-
Li, Q.1
Rus, D.2
-
17
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang. Self-securing ad hoc wireless networks. 7th International Symposium on Computers and Communications, pp 567-574, 2002.
-
(2002)
7th International Symposium on Computers and Communications
, pp. 567-574
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
18
-
-
0035704362
-
Providing robust and ubiquitous security support for manet
-
H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang. Providing robust and ubiquitous security support for manet. 9th INternational Conference on Network Protocols, pp 251-260, 2001.
-
(2001)
9th INternational Conference on Network Protocols
, pp. 251-260
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
19
-
-
0030126124
-
Distributing trust with the rampart tool kit
-
M. Reiter. Distributing trust with the rampart tool kit. Communications of the ACM, 39(4):71-74, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4
, pp. 71-74
-
-
Reiter, M.1
-
20
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30,1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|