Self-Encryption Scheme for Data Security in Mobile Devices
暂无分享,去创建一个
[1] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[2] Alex Biryukov,et al. Block Ciphers and Stream Ciphers: The State of the Art , 2004, IACR Cryptol. ePrint Arch..
[3] D. E. Denning,et al. A taxonomy for key escrow encryption systems : How to use key escrow , 1996 .
[4] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[5] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[8] Xuemin Shen,et al. Multiple Key Sharing and Distribution Scheme With$(n,t)$Threshold for NEMO Group Communications , 2006, IEEE Journal on Selected Areas in Communications.
[9] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[10] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[11] Giuseppe Persiano,et al. Distributed Certified Information Access for Mobile Devices , 2007, WISTP.
[12] Johan Håstad,et al. Improved Analysis of the BMGL Keystream Generator , 2001 .
[13] Brian D. Noble,et al. Mobile Device Security Using Transient Authentication , 2006, IEEE Transactions on Mobile Computing.
[14] Yongdae Kim,et al. Securing distributed storage: challenges, techniques, and systems , 2005, StorageSS '05.
[15] Dieter Schmalstieg,et al. Towards Massively Multi-user Augmented Reality on Handheld Devices , 2005, Pervasive.
[16] Marine Minier,et al. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.
[17] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[18] Adi Shamir. Stream Ciphers: Dead or Alive? , 2004, ASIACRYPT.
[19] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.
[20] David A. Basin,et al. Securing the Distribution and Storage of Secrets with Trusted Platform Modules , 2007, WISTP.
[21] Roy H. Campbell,et al. A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2001, IEEE Wirel. Commun..
[22] Erik Zenner. Why IV Setup for Stream Ciphers is Difficult , 2007, Symmetric Cryptography.