Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Key establishment")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 35

  • Page / 2
Export

Selection :

  • and

Security flaws in authentication and key establishment protocols for mobile communicationsSHIM, Kyungah; LEE, Young-Ran.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 62-74, issn 0096-3003, 13 p.Article

Enhanced secure anonymous authentication scheme for roaming service in global mobility networksMUN, Hyeran; HAN, Kyusuk; YAN SUN LEE et al.Mathematical and computer modelling. 2012, Vol 55, Num 1-2, pp 214-222, issn 0895-7177, 9 p.Article

Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networksYASMIN, Rehana; RITTER, Eike; GUILIN WANG et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 453-465, issn 1615-5262, 13 p.Article

Analysis and design of distributed key distribution centersBLUNDO, Carlo; D'ARCO, Paolo.Journal of cryptology. 2005, Vol 18, Num 4, pp 391-414, issn 0933-2790, 24 p.Article

Extended KCI attack against two-party key establishment protocolsQIANG TANG; LIQUN CHEN.Information processing letters. 2011, Vol 111, Num 15, pp 744-747, issn 0020-0190, 4 p.Article

SHAKE: Single HAsh key establishment for resource constrained devicesBARSOCCHI, Paolo; OLIGERI, Gabriele; SORIENTE, Claudio et al.Ad hoc networks. 2013, Vol 11, Num 1, pp 288-297, issn 1570-8705, 10 p.Article

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networksYUANYUAN ZHANG; DAWU GU; JUANRU LI et al.Computer communications. 2008, Vol 31, Num 13, pp 2959-2971, issn 0140-3664, 13 p.Article

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networksLI, Chun-Ta; HWANG, Min-Shiang; CHU, Yen-Ping et al.Computer communications. 2008, Vol 31, Num 12, pp 2803-2814, issn 0140-3664, 12 p.Article

Resource-efficient authentic key establishment in heterogeneous wireless sensor networksQI SHI; NING ZHANG; MERABTI, Madjid et al.Journal of parallel and distributed computing (Print). 2013, Vol 73, Num 2, pp 235-249, issn 0743-7315, 15 p.Article

Analysis and improvement of an authenticated key exchange protocol for sensor networksXIAOJIAN TIAN; WONG, Duncan S; ZHU, Robert W et al.IEEE communications letters. 2005, Vol 9, Num 11, pp 970-972, issn 1089-7798, 3 p.Article

SBK : A Self-Configuring Framework for Bootstrapping Keys in Sensor NetworksFANG LIU; XIUZHEN CHENG; LIRAN MA et al.IEEE transactions on mobile computing. 2008, Vol 7, Num 7, pp 858-868, issn 1536-1233, 11 p.Article

LKE : A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor NetworksFANG LIU; XIUZHEN CHENG.IEEE transactions on wireless communications. 2008, Vol 7, Num 1, pp 224-232, issn 1536-1276, 9 p.Article

Three-pass hybrid key establishment protocol based on ESIGN signatureLEE, S.-M; KIM, T.-Y.Lecture notes in computer science. 1999, pp 459-467, issn 0302-9743, isbn 3-540-66488-2Conference Paper

Privacy-Preserving Universal Authentication Protocol for Wireless CommunicationsDAOJING HE; JIAJUN BU; CHAN, Sammy et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 2, pp 431-436, issn 1536-1276, 6 p.Article

Denial-of-service resistance in key establishmentSMITH, Jason; TRITILANUNT, Suratose; BOYD, Colin et al.International journal of wireless and mobile computing (Print). 2007, Vol 2, Num 1, pp 59-71, issn 1741-1084, 13 p.Article

PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networksYEH, Lo-Yao; CHEN, Yen-Cheng; HUANG, Jiun-Long et al.Computer communications. 2011, Vol 34, Num 3, pp 447-456, issn 0140-3664, 10 p.Article

Key Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor NetworksTSAI, Shi-Chun; TZENG, Wen-Guey; ZHOU, Kun-Yi et al.IEEE transactions on wireless communications. 2009, Vol 8, Num 3, pp 1218-1222, issn 1536-1276, 5 p.Article

Lightweight collaborative key establishment scheme for the Internet of ThingsBEN SAIED, Yosra; OLIVEREAU, Alexis; ZEGHLACHE, Djamal et al.Computer networks (1999). 2014, Vol 64, pp 273-295, issn 1389-1286, 23 p.Article

Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETsHORNG, Shi-Jinn; TZENG, Shiang-Feng; XIAN WANG et al.Wireless personal communications. 2014, Vol 79, Num 2, pp 1445-1454, issn 0929-6212, 10 p.Article

Key establishment for layered group-based Wireless Sensor NetworksXUEPING LI; DENGFENG YANG; SAWHNEY, Rapinder et al.International journal of ad hoc and ubiquitous computing (Print). 2010, Vol 5, Num 3, pp 150-162, issn 1743-8225, 13 p.Article

The importance of proofs of security for key establishment protocols Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocolsCHOO, Kim-Kwang Raymond; BOYD, Colin; HITCHCOCK, Yvonne et al.Computer communications. 2006, Vol 29, Num 15, pp 2788-2797, issn 0140-3664, 10 p.Article

Seeing-ls-Believing : using camera phones for human-verifiable authenticationMCCUNE, Jonathan M; PERRIG, Adrian; REITER, Michael K et al.International journal of security and networks (Print). 2009, Vol 4, Num 1-2, pp 43-56, issn 1747-8405, 14 p.Article

Pair-wise path key establishment in wireless sensor networksSHEU, Jang-Ping; CHENG, Jui-Che.Computer communications. 2007, Vol 30, Num 11-12, pp 2365-2374, issn 0140-3664, 10 p.Article

A two-layer key establishment scheme for wireless sensor networksYUN ZHOU; YUGUANG FANG.IEEE transactions on mobile computing. 2007, Vol 6, Num 9, pp 1009-1020, issn 1536-1233, 12 p.Article

Key establishment protocols using environmental and physiological data in wireless sensor networksSINGH, Kalvinder; MUTHUKKUMARASAMY, Vallipuram.International journal of sensor networks (Print). 2010, Vol 8, Num 1, pp 8-26, issn 1748-1279, 19 p.Article

  • Page / 2