Mutual authentication and key exchange for low power wireless communications
暂无分享,去创建一个
[1] C. Campbell. Design and specification of cryptographic capabilities , 1978, IEEE Communications Society Magazine.
[2] Dan Boneh,et al. Experimenting with Electronic Commerce on the PalmPilot , 1999, Financial Cryptography.
[3] Duncan S. Wong,et al. The performance measurement of cryptographic primitives on palm devices , 2001, Seventeenth Annual Computer Security Applications Conference.
[4] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[5] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[6] Christopher Carroll,et al. The Software-Oriented Stream Cipher SSC2 , 2000, FSE.
[7] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[8] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.