Authentication and Payment in Future Mobile Systems (0)

Cached

Download Links

by Günther Horn , Bart Preneel
Citations:34 - 2 self

Active Bibliography

101 The Elliptic Curve Digital Signature Algorithm (ECDSA) – Don Johnson, Alfred Menezes - 1999
SEC 1: Elliptic . . . – n.n. - 2000
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
Keysizes (2009-2010) Editor – Nigel Smart (bris, Ruhr-universität Bochum, Royal Holloway - 2008
Keysizes (2011-2012) Editor – Nigel Smart (bris, Ruhr-universität Bochum, Royal Holloway - 2008
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography – unknown authors - 1999
68 Authenticated Multi-Party Key Agreement – Mike Just, Serge Vaudenay - 1996
45 Unknown Key-Share Attacks on the Station-To-Station (STS) Protocol – Simon Blake-wilson, Alfred Menezes - 1999
67 Authenticated Diffie-Hellman Key Agreement Protocols – Simon Blake-Wilson, Alfred Menezes - 1998
unknown title – Foreword Whitfield Diffie
structures to cryptography – unknown authors - 2009
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001
1 On the Efficiency of Authentication Protocols, Digital Signatures and Their Applications in E-Health: A Top-Down Approach – Kemal Biçakci, Kemal Bıçakcı, Assoc Prof, Dr. Onur Demirörs, Assist Prof Dr, Y. Murat Erten, Prof Dr. Nazife Baykal, Bıçakcı Kemal - 2003
1 Prompted User Retrieval of Secret Entropy: The Passmaze Protocol – Daniel R. L. Brown - 2005
11 SECURITY AND COOPERATION IN WIRELESS NETWORKS -- Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing – Levente Buttyán, Jean-pierre Hubaux - 2007
16 Signcryption and its applications in efficient public key solutions – Yuliang Zheng - 1997
Équipe CAIRN- ENSSAT et L’École Politechnique de Silésie à Gliwice – Thèse Université, De Rennes, Docteur De, L’université De Rennes, Danuta Pamula, Électronique Et Informatique, Aleksander Nawrat, Liam Marnane, Romuald Rocher, Arnaud Tisserand, Edward Hrynkiewicz, Danuta Pamuła - 2012
1 Public Key Cryptosystems using Elliptic Curves – J. Borst - 1997
Architectural Techniques for Enabling Secure Cryptographic Processing – John Patrick McGregor ,Jr. - 2005