Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
暂无分享,去创建一个
[1] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[2] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[3] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[4] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[5] Robert Tappan Morris,et al. Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM '04.
[6] Marco Gruteser,et al. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.
[7] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[8] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[9] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[10] M. Frans Kaashoek,et al. Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM 2004.
[11] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Brighten Godfrey,et al. OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.
[15] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[16] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[17] L. Devroye. Non-Uniform Random Variate Generation , 1986 .
[18] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[19] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[20] Serge Fdida,et al. Constraint-Based Geolocation of Internet Hosts , 2004, IEEE/ACM Transactions on Networking.
[21] David L. Mills. Improved algorithms for synchronizing computer network clocks , 2001 .
[22] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[23] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[24] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[25] David L. Mills,et al. Improved algorithms for synchronizing computer network clocks , 1995, TNET.