Location Privacy for Cellular Systems; Analysis and Solution
暂无分享,去创建一个
[1] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[2] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[3] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Niklaus Wirth,et al. Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.
[6] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[7] Dieter Gollmann,et al. Computer Security – ESORICS 2003 , 2003, Lecture Notes in Computer Science.
[8] Jörn Müller-Quade,et al. Initiator-Resilient Universally Composable Key Exchange , 2003, ESORICS.
[9] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[12] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Geir M. Køien,et al. Access security in CDMA2000, including a comparison with UMTS access security , 2004, IEEE Wireless Communications.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[17] Geir M. Køien,et al. Security aspects of 3G-WLAN interworking , 2003, IEEE Commun. Mag..
[18] G.M. Koien,et al. An introduction to access security in UMTS , 2004, IEEE Wireless Communications.
[19] Vladiinir A. Oleshchuk. Spatio-Temporal Exposure Control An investigation of spatial home control and location privacy preserving issues , 2003 .
[20] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[21] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[22] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[23] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[24] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[25] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[26] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.