-
1
-
-
84904437907
-
Enabling crowdsourced mobile internet access
-
G. Iosifidis, L. Gao, J. Huang, and L. Tassiulas, "Enabling crowdsourced mobile internet access," in Proceedings of IEEE INFOCOM, 2014.
-
(2014)
Proceedings of IEEE INFOCOM
-
-
Iosifidis, G.1
Gao, L.2
Huang, J.3
Tassiulas, L.4
-
2
-
-
84904438201
-
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
-
P. Hu, K. Xing, X. Cheng, H. Wei, and H. Zhu, "Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks," in Proceedings of IEEE INFOCOM, 2014.
-
(2014)
Proceedings of IEEE INFOCOM
-
-
Hu, P.1
Xing, K.2
Cheng, X.3
Wei, H.4
Zhu, H.5
-
4
-
-
84954294699
-
Batch fully homomorphic encryption over the integers
-
J. Cheon, J. Coron, J. Kim, and M. Lee, "Batch fully homomorphic encryption over the integers," in Proceedings of IEEE EUROCRYPT, 2013.
-
(2013)
Proceedings of IEEE EUROCRYPT
-
-
Cheon, J.1
Coron, J.2
Kim, J.3
Lee, M.4
-
5
-
-
78751657441
-
Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
J. Huang, L. Yeh, and H. Chien, "Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," in IEEE Transactions on vehicular technology, 2011.
-
(2011)
IEEE Transactions on Vehicular Technology
-
-
Huang, J.1
Yeh, L.2
Chien, H.3
-
6
-
-
84957804123
-
Identification of bad signatures in batches
-
J. Pastuszak, D. Michalek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," in PKC 2000, LNCS 1751, 2000.
-
(2000)
PKC 2000, LNCS 1751
-
-
Pastuszak, J.1
Michalek, D.2
Pieprzyk, J.3
Seberry, J.4
-
7
-
-
32244432588
-
Efficient identication of bad signatures in rsa-type batch signature
-
S. Lee, S. Cho, J. Choi, and Y. Cho, "Efficient identication of bad signatures in rsa-type batch signature," in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006.
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
-
Lee, S.1
Cho, S.2
Choi, J.3
Cho, Y.4
-
8
-
-
77953317265
-
Identification of multiple invalid signatures in pairing-based batched signatures
-
B. J. Matt, "Identification of multiple invalid signatures in pairing-based batched signatures," in PKC 2009, 2009.
-
(2009)
PKC 2009
-
-
Matt, B.J.1
-
9
-
-
84869480265
-
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
-
J. A. Akinyele, M. Green, S. Hohenberger, and M. W. Pagano, "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes," in Proceedings of ACM CCS, 2012.
-
(2012)
Proceedings of ACM CCS
-
-
Akinyele, J.A.1
Green, M.2
Hohenberger, S.3
Pagano, M.W.4
-
10
-
-
84855615935
-
On batch verification with group testing for vehicular communications
-
C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," in Wireless Networks, 2011.
-
(2011)
Wireless Networks
-
-
Zhang, C.1
Ho, P.2
Tapolcai, J.3
-
12
-
-
0041863206
-
Can dsa be improved? Complexity trade-offs with the digital signature standard
-
Naccache, M'Raihi, Vaudenay, and Raphaeli, "Can dsa be improved? complexity trade-offs with the digital signature standard," in Proceedings of EUROCRYPT, 1994.
-
(1994)
Proceedings of EUROCRYPT
-
-
Naccache1
M'Raihi2
Vaudenay3
Raphaeli4
-
13
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proceedings of IEEE INFOCOM, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
14
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks." in Proceedings of IEEE INFOCOM, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.S.5
-
15
-
-
84887266426
-
B-specs+: Batch verification for secure pseudonymous authentication in vanet
-
S. Horng, S. Tzeng, Y. Pan, and P. Fan, "b-specs+: Batch verification for secure pseudonymous authentication in vanet," in IEEE Transactions on Information Forensics and Security, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
-
-
Horng, S.1
Tzeng, S.2
Pan, Y.3
Fan, P.4
-
16
-
-
84954294704
-
Finding invalid signatures in pairing-based bathes
-
L. Law and B. Matt, "Finding invalid signatures in pairing-based bathes," in Cryptography and Coding, 2007.
-
(2007)
Cryptography and Coding
-
-
Law, L.1
Matt, B.2
-
19
-
-
84880254414
-
Toward a secure batch verification with group testing for vanet
-
C. Lee and Y. Lai, "Toward a secure batch verification with group testing for vanet," in Wireless Networks, 2013.
-
(2013)
Wireless Networks
-
-
Lee, C.1
Lai, Y.2
-
21
-
-
77953306183
-
An opportunistic batch bundle authentication scheme for energy constrained dtns
-
H. Zhu, X. Lin, R. Lu, X. S. Shen, and Z. Cao, "An opportunistic batch bundle authentication scheme for energy constrained dtns," in Proceedings of IEEE INFOCOM, 2010.
-
(2010)
Proceedings of IEEE INFOCOM
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Shen, X.S.4
Cao, Z.5
-
22
-
-
84904439253
-
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
-
Z. Lu, W. Wang, and C. Wang, "How can botnets cause storms? understanding the evolution and impact of mobile botnets," in Proceedings of IEEE INFOCOM, 2014.
-
(2014)
Proceedings of IEEE INFOCOM
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
|