On Traveling Incognito (1998)

Cached

Download Links

by Giuseppe Ateniese , Amir Herzberg , Hugo Krawczyk , Gene Tsudik
Venue:Computer Networks
Citations:1 - 0 self

Active Bibliography

11 Untraceable Mobility or How to Travel Incognito – Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik - 1999
22 On Travelling Incognito – A. Herzberg, H. Krawczyk, G. Tsudik - 1994
9 An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks – Jiejun Kong, Xiaoyan Hong, Mario Gerla - 2003
8 A Method Providing Identity Privacy to Mobile Users during Authentication – Didier Samfat, Refik Molva - 1994
19 Untraceability in Mobile Networks – Didier Samfat, Refik Molva, N. Asokan - 1995
20 Unlinkable Serial Transactions: Protocols and Applications – Stuart G. Stubblebine, Paul F. Syverson, David M. Goldschlag, Usinternetworking Inc - 2000
Authentication Protocols in Wireless Communications – Hung-yu Lin, Lein Harn, Vijay Kumar
5 An Authentication and Security Protocol for Mobile Computing – Yuliang Zheng - 1996
2 Anonymous wireless authentication on a portable cellular mobile system – Shiuh-jeng Wang - 2004
4 Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack – Kanta Matsuura, Hideki Imai - 1999
34 Authentication and Payment in Future Mobile Systems – Günther Horn, Bart Preneel
Copyright C – Ieee See, Michael B. Greenwald, Sandeep K. Singhal, Jonathan R. Stone, David R. Cheriton - 1996
67 How to Make Personalized Web Browsing Simple, Secure, and Anonymous – Eran Gabber, Phillip B. Gibbons, Yossi Matias, Alain Mayer - 1998
44 Secure group communication in asynchronous networks with failures: Integration and experiments – Yair Amir, Ý Damian Hasse, Þ Yongdae Kim, Cristina Nita-rotaru, Ý Theo Schlossnagle, Ý John Schultz, Ý Jonathan Stanton Ý - 2000
3 Anonymous Internet Mercantile Protocol – David M. Kristol, Steven H. Low, Nicholas F. Maxemchuk - 1994
3 Reusable Off-line Electronic Cash Using Secret Splitting – Hitesh Tewari, Donal O'Mahony, Michael Peirce - 1998
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
[22]) � � ��� � ����� � ��� � ��� � ����� � ��� � ����� � � � � � � � ����� � � � ( � � � � � � � � � � � � � � – unknown authors
Cryptographic Primitives – Paul Garrett - 2007