-
1
-
-
0028272762
-
Privacy and Authentication for Wireless Local Area Networks
-
A. Aziz and W. Diffie, "Privacy and Authentication for Wireless Local Area Networks," IEEE Personal Communications, vol. 1, pp. 25-31, 1994.
-
(1994)
IEEE Personal Communications
, vol.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
3
-
-
0026393897
-
Privacy and Authentication on a Portable Communications System
-
IEEE Press
-
M. J. Belier, L.-F. Chang, and Y. Yacobi, "Privacy and Authentication on a Portable Communications System," in Proceedings of GLOBECOM'91, pp. 1922-1927, IEEE Press, 1991.
-
(1991)
Proceedings of GLOBECOM'91
, pp. 1922-1927
-
-
Belier, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
4
-
-
0008444439
-
Security for Personal Communication Services: Public-Key vs. Private Key Approaches
-
IEEE Press
-
M. J. Beller, L.-F. Chang, and Y. Yacobi, "Security for Personal Communication Services: Public-Key vs. Private Key Approaches," in Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'92), pp. 26-31, IEEE Press, 1992.
-
(1992)
Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'92)
, pp. 26-31
-
-
Beller, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
5
-
-
0027641891
-
Privacy and Authentication on a Portable Communications System
-
Aug
-
M. J. Belier, L.-F. Chang, and Y. Yacobi, "Privacy and Authentication on a Portable Communications System," IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, Aug. 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 821-829
-
-
Belier, M.J.1
Chang, L.-F.2
Yacobi, Y.3
-
6
-
-
0027589399
-
Fully-Fledged two-way Public Key Authentication and Key Agreement for Low-Cost Terminals
-
May
-
M. J. Beller and Y. Yacobi, "Fully-Fledged two-way Public Key Authentication and Key Agreement for Low-Cost Terminals," Electronics Letters, 29, pp. 999-1001, May 1993.
-
(1993)
Electronics Letters
, vol.29
, pp. 999-1001
-
-
Beller, M.J.1
Yacobi, Y.2
-
7
-
-
0002378128
-
Optimal Privacy and Authentication on a Portable Communications System
-
U. Carlsen, "Optimal Privacy and Authentication on a Portable Communications System" ACM Operating Systems Review, 28 (3), 1994, pp. 16-23.
-
(1994)
ACM Operating Systems Review
, vol.28
, Issue.3
, pp. 16-23
-
-
Carlsen, U.1
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. E1Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
E1gamal, T.1
-
10
-
-
0028385109
-
Three Systems for Cryptographic Protocol Analysis
-
R. Kemmerer, C. Meadows and J. Millen, "Three Systems for Cryptographic Protocol Analysis," Journal of Cryptology, vol. 7, pp. 79-130, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
11
-
-
84955602379
-
Formal Verification of Cryptographic Protocols: A Survey
-
(J. Pieprzyk and R. Safavi-Naini, eds.), of Lecture Notes in Computer Science, Springer-Verlag
-
C. Meadows, "Formal Verification of Cryptographic Protocols: A Survey," in Advances in Cryptology - ASIACRYPT '94 (J. Pieprzyk and R. Safavi-Naini, eds.), vol. 917 of Lecture Notes in Computer Science, pp. 135-150, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - ASIACRYPT '94
, vol.917
, pp. 135-150
-
-
Meadows, C.1
-
13
-
-
0031143949
-
The Changing Environment for Security Protocols
-
May/June
-
R. Needham, "The Changing Environment for Security Protocols," IEEE Network Magazine, vol. 11, no. 3, pp. 12-15, May/June 1997.
-
(1997)
IEEE Network Magazine
, vol.11
, Issue.3
, pp. 12-15
-
-
Needham, R.1
-
14
-
-
84969354234
-
On Key Distribution and Authentication in Mobile Radio Networks
-
Springer-Verlag
-
C. Park, K. Kurosawa, T. Okamoto and S. Tsujii, "On Key Distribution and Authentication in Mobile Radio Networks", Advances in Cryptology - Eurocrypt'93, Springer-Verlag, 1994, pp. 461-465.
-
(1994)
Advances in Cryptology - Eurocrypt'93
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
15
-
-
0003614758
-
Digitalized Signatures and Public-Key Functions as Intractable as Factorization
-
M.O. Rabin, "Digitalized Signatures and Public-Key Functions as Intractable as Factorization", MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
-
(1979)
MIT/LCS/TR-212, MIT Laboratory for Computer Science
-
-
Rabin, M.O.1
-
16
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
17
-
-
84969340391
-
Key Distribution Protocol for Digital Mobile Communications Systems
-
Springer-Verlag
-
M. Tatebayashi, N. Matsuzaki and D.B. Newman Jr., "Key Distribution Protocol for Digital Mobile Communications Systems", Advances in Cryptology - Crypto'89, Springer-Verlag, 1990, pp. 324-333.
-
(1990)
Advances in Cryptology - Crypto'89
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
18
-
-
85028768002
-
Security Aspects of Mobile Communications
-
(B. Preneel, R. Govaerts, and J. Vandewalle, eds.), of Lecture Notes in Computer Science, Springer-Verlag
-
K. Vedder, "Security Aspects of Mobile Communications," in Computer Security and Industrial Cryptography (B. Preneel, R. Govaerts, and J. Vandewalle, eds.), vol. 741 of Lecture Notes in Computer Science, pp. 193-210, Springer-Verlag, 1993.
-
(1993)
Computer Security and Industrial Cryptography
, vol.741
, pp. 193-210
-
-
Vedder, K.1
-
19
-
-
84956855423
-
Design of Secure End-to-End Protocols for Mobile Systems
-
Alberta, Canada
-
V. Varadharajan and Y. Mu, "Design of Secure End-to-End Protocols for Mobile Systems," Wireless 96 Conference, Alberta, Canada, pp. 561-568.
-
Wireless 96 Conference
, pp. 561-568
-
-
Varadharajan, V.1
Mu, Y.2
-
20
-
-
84947922642
-
On the Design of Security Protocols for Mobile Communications
-
Springer-Verlag
-
V. Varadharajan and Y. Mu, "On the Design of Security Protocols for Mobile Communications", ACISP'96 Conference, Springer-Verlag, 1996, pp. 134-145.
-
(1996)
ACISP'96 Conference
, pp. 134-145
-
-
Varadharajan, V.1
Mu, Y.2
|