Universally composable secure positioning in the bounded retrieval model
暂无分享,去创建一个
Chao Yang | Jianfeng Ma | Li Yang | Junwei Zhang | Jianfeng Ma | Li Yang | Chao Yang | Junwei Zhang
[1] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[2] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[3] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[4] John C. Mitchell,et al. A modular correctness proof of IEEE 802.11i and TLS , 2005, CCS '05.
[5] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[6] Sinan Gezici,et al. A Survey on Wireless Position Estimation , 2008, Wirel. Pers. Commun..
[7] Jinzhou Li,et al. Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty , 2013, Science China Information Sciences.
[8] Qiang Zhang,et al. A top-down positioning scheme for underwater wireless sensor networks , 2013, Science China Information Sciences.
[9] N. Malamuth,et al. Why Pornography? Models of Functions and Effects , 1984 .
[10] Markus Jakobsson,et al. Efficient Constructions for One-Way Hash Chains , 2005, ACNS.
[11] Rafail Ostrovsky,et al. Position-Based Cryptography , 2014, SIAM J. Comput..
[12] Stefan Dziembowski,et al. Intrusion-Resilience Via the Bounded-Storage Model , 2006, TCC.
[13] Z. Cao,et al. Position-Verification in Multi-Channel Model , 2012 .
[14] Stefan Dziembowski,et al. Intrusion-Resilient Secret Sharing , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[15] Yang Chao. UC model of secure positioning protocols , 2013 .
[16] Jianfeng Ma,et al. Universally composable one-time signature and broadcast authentication , 2010, Science China Information Sciences.
[17] Rafail Ostrovsky,et al. Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..
[18] Jianfeng Ma,et al. Universally composable secure TNC model and EAP-TNC protocol in IF-T , 2010, Science China Information Sciences.
[19] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[20] Zhenfu Cao,et al. Position-Verification in Multi-Channel Models , 2011, IACR Cryptol. ePrint Arch..