Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
暂无分享,去创建一个
[1] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[2] M. Bellare,et al. HMAC: Keyed-Hashing for Message Authentication, RFC 2104 , 2000 .
[3] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[4] Mitsuru Matsui,et al. A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer , 1998, Public Key Cryptography.
[5] Gerhard Fettweis,et al. Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.
[6] Andrew S. Tanenbaum,et al. Symmetric Key Authentication Services Revisited , 2004, ACISP.
[7] Christof Paar,et al. Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.
[8] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[9] Christof Paar,et al. Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers , 2001, Public Key Cryptography.
[10] Scott C. Burleigh,et al. Bundle Protocol Specification , 2007, RFC.
[11] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] T. Dierks,et al. The TLS protocol , 1999 .
[15] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[16] Peng Chong. Tan. Efficient implementation of elliptic curve cryptosystems , 2000 .