Authenticity in a reliable protocol for mobile computing
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[3] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[4] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[5] Alberto Bartoli. Group-based multicast and dynamic membership in wireless networks with incomplete spatial coverage , 1998, Mob. Networks Appl..
[6] Gavin Lowe,et al. Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.
[7] Alberto Bartoli,et al. Efficient Verification of a Multicast Protocol for Mobile Computing , 2001, Comput. J..
[8] Myla Archer. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME , 2002 .
[9] Cristina Videira Lopes,et al. Aerial acoustic communications , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).
[10] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[11] Giuseppe Anastasi,et al. Group multicast in distributed mobile systems with unreliable wireless network , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.
[12] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[13] Margery Eldridge,et al. Satchel: providing access to any document, any time, anywhere , 2000, TCHI.
[14] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[15] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[16] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[17] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[18] Fabio Martinelli,et al. Analysis of security protocols as open systems , 2003, Theor. Comput. Sci..
[19] Fabio Martinelli,et al. Automated Analysis of Some Security Mechanisms of SCEP , 2002, ISC.
[20] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.