Multipath Authentication without shared Secrets and with Applications in Quantum Networks
暂无分享,去创建一个
[1] Peter Schartner,et al. Game-Theoretic Security Analysis of Quantum Networks , 2009, 2009 Third International Conference on Quantum, Nano and Micro Technologies.
[2] Panayiotis Kotzanikolaou,et al. Secure Multipath Routing for Mobile Ad Hoc Networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.
[3] J. Bierbrauer. Authentication Via Algebraic-Geometric Codes , 1997 .
[4] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[5] Stefan Rass. On Information-Theoretic Security - Contemporary Problems and Solutions , 2009 .
[6] Dharma P. Agrawal,et al. Secure interconnection protocol for integrated Internet and ad hoc networks , 2008, Wirel. Commun. Mob. Comput..
[7] Victor Shoup,et al. On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.
[8] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[9] Yu-Kwong Kwok,et al. A new multipath routing approach to enhancing TCP security in ad hoc wireless networks , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).
[10] G. Gilbert,et al. Practical Quantum Cryptography: A Comprehensive Analysis (Part One) , 2000, quant-ph/0009027.
[11] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[12] Yuguang Fang,et al. SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.
[13] Renato Renner,et al. Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret , 2003, CRYPTO.
[14] Angelos D. Keromytis,et al. DoubleCheck: Multi-path verification against man-in-the-middle attacks , 2009, 2009 IEEE Symposium on Computers and Communications.
[15] Douglas R. Stinson. Universal Hashing and Authentication Codes , 1991, CRYPTO.