Multi-Channel Key Agreement Using Encrypted Public Key Exchange
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Bruce Christianson,et al. "Fair" Authentication in Pervasive Computing , 2005, MADNES.
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Bengt Ahlgren,et al. Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..
[5] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[7] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[8] Frank Stajano,et al. The Resurrecting Duckling , 1999 .
[9] Ming Xiao,et al. Bootstrapping multi-party ad-hoc security , 2006, SAC '06.
[10] Mike Burmester,et al. Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers , 2006, MADNES.
[11] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.
[12] Jaap-Henk Hoepman. Ephemeral Pairing on Anonymous Networks , 2005, SPC.
[13] Gene Tsudik,et al. Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.
[14] Bruce Christianson,et al. Secure Sessions from Weak Secrets , 2003, Security Protocols Workshop.
[15] William Stallings,et al. Cryptography and network security , 1998 .
[16] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Bruce Christianson,et al. Secure sessions from weak secrets. Commentary. Authors' reply , 2005 .