-
1
-
-
84908397157
-
Internet of things for smart cities
-
Feb.
-
A. Zanella, N. Bui, A. P. Castellani, L. Vangelista, and M. Zorzi, "Internet of things for smart cities," IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.P.3
Vangelista, L.4
Zorzi, M.5
-
2
-
-
79955795318
-
Smart cities and the future internet: Towards cooperation frameworks for open innovation
-
Berlin, Germany: Springer
-
H. Schaffers, N. Komninos, M. Pallot, B. Trousse, M. Nilsson, and A. Oliveira, "Smart cities and the future internet: Towards cooperation frameworks for open innovation," in The Future Internet-Future Internet Assembly 2011: Achievements and Technological Promises. Berlin, Germany: Springer, 2011, pp. 431-446.
-
(2011)
The Future Internet-Future Internet Assembly 2011: Achievements and Technological Promises
, pp. 431-446
-
-
Schaffers, H.1
Komninos, N.2
Pallot, M.3
Trousse, B.4
Nilsson, M.5
Oliveira, A.6
-
3
-
-
77949676803
-
Key agreement, the Algebraic EraserTM, and lightweight crytography
-
I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux, "Key agreement, the Algebraic EraserTM, and lightweight crytography," Contemporary Math., vol. 416, no. 2006, pp. 1-34, 2006.
-
(2006)
Contemporary Math.
, vol.416
, Issue.2006
, pp. 1-34
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
Lemieux, S.4
-
4
-
-
0000942205
-
Theory of braids
-
E. Artin, "Theory of braids," Ann. Math., vol. 48, pp. 101-126, 1947.
-
(1947)
Ann. Math.
, vol.48
, pp. 101-126
-
-
Artin, E.1
-
5
-
-
85081706597
-
-
Security in low resource environments, 2006. [Online]. Available: http://www.securerf.com/wp-content/uploads/2014/03/White-Paper-Security-in-Low-Resource-Environments.pdf
-
(2006)
Security in Low Resource Environments
-
-
-
6
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
J. Hoffstein, J. Pipher, and J. H. Silverman, "NTRU: A ring-based public key cryptosystem," in Proc. 3rd Int. Symp. Algorithmic Number Theory, 1998, pp. 267-288.
-
(1998)
Proc. 3rd Int. Symp. Algorithmic Number Theory
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
8
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
-
Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol," in Proc. IEEE Int. Conf. RFID, 2008, pp. 97-104.
-
(2008)
Proc. IEEE Int. Conf. RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
9
-
-
77952337733
-
Low-cost untraceable authentication protocols for RFID
-
Y. K. Lee, L. Batina, D. Singelee, and I. Verbauwhede, "Low-cost untraceable authentication protocols for RFID," in Proc. 3rd ACM Conf. Wireless Netw. Secur., 2010, pp. 55-64.
-
(2010)
Proc. 3rd ACM Conf. Wireless Netw. Secur.
, pp. 55-64
-
-
Lee, Y.K.1
Batina, L.2
Singelee, D.3
Verbauwhede, I.4
-
10
-
-
70349268101
-
Untraceable RFID authentication protocols: Revision of EC-RAC
-
Y. K. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC," in Proc. IEEE Int. Conf. RFID, 2009, pp. 178-185.
-
(2009)
Proc. IEEE Int. Conf. RFID
, pp. 178-185
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
11
-
-
84908530088
-
Proper RFID privacy: Model and protocols
-
Dec.
-
J. Hermans, R. Peeters, and B. Preneel, "Proper RFID privacy: Model and protocols," IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2888-2902, Dec. 2014.
-
(2014)
IEEE Trans. Mobile Comput.
, vol.13
, Issue.12
, pp. 2888-2902
-
-
Hermans, J.1
Peeters, R.2
Preneel, B.3
-
12
-
-
85084161952
-
PGP in constrained wireless devices
-
M. Brown, D. Cheung, D. Hankerson, J. L. Hernandez, M. Kirkup, and A. Menezes, "PGP in constrained wireless devices," in Proc. 9th Conf. USENIX Secur. Symp., 2000, pp. 19-19.
-
(2000)
Proc. 9th Conf. USENIX Secur. Symp.
, pp. 19
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
13
-
-
84974622583
-
New public-key cryptosystem using braid groups
-
K. H. Ko, S. Lee, J. H. Cheon, J. W. Han, J. Kang, and C. Park, "New public-key cryptosystem using braid groups," in Proc. 20th Annu. Int. Cryptology Conf. Advances Cryptology, 2000, pp. 166-183.
-
(2000)
Proc. 20th Annu. Int. Cryptology Conf. Advances Cryptology
, pp. 166-183
-
-
Ko, K.H.1
Lee, S.2
Cheon, J.H.3
Han, J.W.4
Kang, J.5
Park, C.6
-
14
-
-
84880879949
-
Pseudorandomness from braid groups
-
E. Lee, S. Lee, and S. G. Hahn, "Pseudorandomness from braid groups," in Proc. 21st Annu. Int. Cryptology Conf. Advances Cryptology, 2001, pp. 486-502.
-
(2001)
Proc. 21st Annu. Int. Cryptology Conf. Advances Cryptology
, pp. 486-502
-
-
Lee, E.1
Lee, S.2
Hahn, S.G.3
-
15
-
-
84937563572
-
New key agreement protocols in braid group cryptography
-
I. Anshel, M. Anshel, B. Fisher, and D. Goldfeld, "New key agreement protocols in braid group cryptography," in Proc. Conf. Topics Cryptology: Cryptographer's Track RSA, 2001, pp. 13-27.
-
(2001)
Proc. Conf. Topics Cryptology: Cryptographer's Track RSA
, pp. 13-27
-
-
Anshel, I.1
Anshel, M.2
Fisher, B.3
Goldfeld, D.4
-
16
-
-
33645966292
-
New signature scheme using conjugacy problem
-
K. H. Ko, D. H. Choi, M. S. Cho, and J. Lee, "New signature scheme using conjugacy problem," IACR Cryptology ePrint Archive, vol. 2002, 2002, Art. no. 168.
-
(2002)
IACR Cryptology EPrint Archive
, vol.2002
-
-
Ko, K.H.1
Choi, D.H.2
Cho, M.S.3
Lee, J.4
-
19
-
-
84861596547
-
Short expressions of permutations as products and pryptanalysis of the algebraic eraser
-
A. Kalka, M. Teicher, and B. Tsaban, "Short expressions of permutations as products and pryptanalysis of the algebraic eraser," Advances Appl. Math., vol. 49, no. 1, pp. 57-76, 2012.
-
(2012)
Advances Appl. Math.
, vol.49
, Issue.1
, pp. 57-76
-
-
Kalka, A.1
Teicher, M.2
Tsaban, B.3
-
20
-
-
84977486834
-
A practical cryptography of the algebraic eraser
-
A. Ben-Zvi, S. R. Blackburn, and B. Tsaban, "A practical cryptography of the algebraic eraser," IACR Cryptology ePrint Archive, vol. 2015, p. 1102, 2015.
-
(2015)
IACR Cryptology EPrint Archive
, vol.2015
, pp. 1102
-
-
Ben-Zvi, A.1
Blackburn, S.R.2
Tsaban, B.3
-
21
-
-
84977543186
-
On the security of the Algebraic Eraser tag authentication protocol
-
M. Manulis, A. Sadeghi, and S. Schneider, Eds., Guildford, UK, Springer, Jun.
-
S. R. Blackburn and M. J. B. Robshaw, "On the security of the Algebraic Eraser tag authentication protocol," Appl. Cryptography Netw. Security-14th Int. Conf., ACNS 2016, Proc., ser. LNCS, M. Manulis, A. Sadeghi, and S. Schneider, Eds., Guildford, UK, Springer, vol. 9696, pp. 3-17, Jun. 2016.
-
(2016)
Appl. Cryptography Netw. Security-14th Int. Conf., ACNS 2016, Proc., Ser. LNCS
, vol.9696
, pp. 3-17
-
-
Blackburn, S.R.1
Robshaw, M.J.B.2
-
22
-
-
85081709375
-
Defeating the Ben-Zvi, Blackburn, and Tsaban attack on the algebraic eraser
-
vol. abs/1601.04780
-
I. Anshel, D. Atkins, D. Goldfeld, and P. E. Gunnells, "Defeating the Ben-Zvi, Blackburn, and Tsaban attack on the algebraic eraser," CoRR, vol. abs/1601.04780, 2016. [Online]. Available: http://arxiv.org/abs/1601.04780
-
(2016)
CoRR
-
-
Anshel, I.1
Atkins, D.2
Goldfeld, D.3
Gunnells, P.E.4
-
23
-
-
85081709154
-
Defeating the kalka-teicher-tsaban linear algebra attack on the algebraic eraser
-
vol. abs/1202.0598
-
D. Goldfeld and P. E. Gunnells, "Defeating the kalka-teicher-tsaban linear algebra attack on the algebraic eraser," CoRR, vol. abs/1202.0598, 2012. [Online].Available: http://arxiv.org/abs/1202.0598
-
(2012)
CoRR
-
-
Goldfeld, D.1
Gunnells, P.E.2
-
25
-
-
85081708896
-
-
IEEE P1363, (2008). [Online]. Available: http://grouper.ieee.org/groups/1363/
-
(2008)
IEEE P1363
-
-
-
26
-
-
77952052817
-
Speed records for NTRU
-
J. Hermans, F. Vercauteren, and B. Preneel, "Speed records for NTRU," in Proc. Int. Conf. Topics Cryptology, 2010, pp. 73-88.
-
(2010)
Proc. Int. Conf. Topics Cryptology
, pp. 73-88
-
-
Hermans, J.1
Vercauteren, F.2
Preneel, B.3
-
28
-
-
85081706080
-
IBIHOP: Proper privacy preserving mutual RFID authentication
-
R. Peeters, J. Hermans, and J. Fan, "IBIHOP: Proper privacy preserving mutual RFID authentication," in Proc. Workshop RFID IoT Secur., 2013, pp. 3-16.
-
(2013)
Proc. Workshop RFID IoT Secur.
, pp. 3-16
-
-
Peeters, R.1
Hermans, J.2
Fan, J.3
-
30
-
-
84954429881
-
An elliptic curve cryptography-based RFID authentication securing E-health system
-
642425
-
C.-I. Lee and H.-Y. Chien, "An elliptic curve cryptography-based RFID authentication securing E-health system," Int. J. Distrib. Sensor Netw., vol. 2015, no. 642425, pp. 109-126, 2015.
-
(2015)
Int. J. Distrib. Sensor Netw.
, vol.2015
, pp. 109-126
-
-
Lee, C.-I.1
Chien, H.-Y.2
-
31
-
-
84981703916
-
Efficient identity authentication and encryption technique for high throughput RFID system
-
C. Hsu, S. Wang, D. Zhang, H. Chu, and N. Lu, "Efficient identity authentication and encryption technique for high throughput RFID system," Secur. Commun. Netw., vol. 9, no. 15, pp. 2581-2591, 2016.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.15
, pp. 2581-2591
-
-
Hsu, C.1
Wang, S.2
Zhang, D.3
Chu, H.4
Lu, N.5
-
32
-
-
84949032526
-
Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems
-
S. Wang, T. Lei, L. Zhang, C. Hsu, and F. Yang, "Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems," Future Generation Comput. Syst., vol. 61, pp. 118-127, 2016.
-
(2016)
Future Generation Comput. Syst.
, vol.61
, pp. 118-127
-
-
Wang, S.1
Lei, T.2
Zhang, L.3
Hsu, C.4
Yang, F.5
-
33
-
-
84895134059
-
A vertical handoff method via self-selection decision tree for internet of vehicles
-
Sep.
-
S. Wang, C. Fan, C. Hsu, Q. Sun, and F. Yang, "A vertical handoff method via self-selection decision tree for internet of vehicles," IEEE Syst. J., vol. 10, no. 3, pp. 1183-1192, Sep. 2016.
-
(2016)
IEEE Syst. J.
, vol.10
, Issue.3
, pp. 1183-1192
-
-
Wang, S.1
Fan, C.2
Hsu, C.3
Sun, Q.4
Yang, F.5
-
34
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
(1978)
Commun ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
35
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe, "An attack on the needham-schroeder public-key authentication protocol," Inf. Process. Lett., vol. 56, no. 3, pp. 131-133, 1995.
-
(1995)
Inf. Process. Lett.
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
36
-
-
33745571012
-
On lattices, learning with errors random linear codes, and cryptography
-
O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," in Proc. 37th Annu. ACM Symp. Theory Comput., 2005, pp. 84-93.
-
(2005)
Proc. 37th Annu. ACM Symp. Theory Comput.
, pp. 84-93
-
-
Regev, O.1
-
37
-
-
0020720357
-
On the security of public key protocols
-
Mar
-
D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
38
-
-
20544456753
-
Contiki-A lightweight and flexible operating system for tiny networked sensors
-
A. Dunkels, B. Gronvall, and T. Voigt, "Contiki-A lightweight and flexible operating system for tiny networked sensors," in Proc. 29th Annu. IEEE Conf. Local Comput. Netw., 2004, pp. 455-462.
-
(2004)
Proc. 29th Annu IEEE Conf. Local Comput. Netw.
, pp. 455-462
-
-
Dunkels, A.1
Gronvall, B.2
Voigt, T.3
-
39
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
K. Piotrowski, P. Langendorfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. 4th ACM Workshop Secur. Ad Hoc Sensor Netw., 2006, pp. 169-176.
-
(2006)
Proc. 4th ACM Workshop Secur. Ad Hoc Sensor Netw.
, pp. 169-176
-
-
Piotrowski, K.1
Langendorfer, P.2
Peter, S.3
-
40
-
-
85028913061
-
On-line/off-line digital schemes
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital schemes," in Proc. 9th Annu. Int. Cryptology Conf. Advances Cryptology, 1989, pp. 263-275.
-
(1989)
Proc. 9th Annu. Int. Cryptology Conf. Advances Cryptology
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
|