<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    參?考?文?獻

    [1] M. Cagalj, S. Capkun, and J. Hubaux, ‘Key agreement in peer-to-peer wireless networks’, in: Proceedings of the IEEE, Special Issue on Security and Cryptography 94(2) (2006), 467–478

    [2] J.L. Carter and M.N. Wegman, ‘Universal Classes of Hash Functions’, Journal of Computer and System Sciences 18(2) (1979), 143–154

    [3] C. Gehrmann and K. Nyberg, ‘Enhancements to Bluetooth baseband security’, in: Proceedings of Nordsec 2001, Copenhagen, Denmark, November 2001

    [4] C. Gehrmann, C.J. Mitchell and K. Nyberg, ‘Manual authentication for wireless devices’, Cryptobytes 7(1) (2004), 29–37

    [5] P. Gemmell and M. Naor, ‘Codes for Interactive Authentication’, in: Advances in Cryptology – Crypto 1993, LNCS, Vol. 773, D.R. Stinson, ed., Springer, 1993, pp. 355–367

    [6] J.-H. Hoepman, ‘Ephemeral Pairing on Anonymous Networks’, in Proceedings of the Second International Conference on Security in Pervasive Computing (SPC 2005), LNCS, Vol. 3450, D. Hutter and M. Ullmann, eds., Springer, 2005, pp. 101–116

    [7] J.-H. Hoepman, ‘Ephemeral Pairing Problem’, in: Proceeding of the 8th International Conference on Financial Cryptography, LNCS, Vol. 3110, A. Juels, ed., Springer, 2004, pp. 212–226

    [8] ISO 7498-2:1989, 信息處理系統—開放系統互聯—基本參考模型—第2部分:安全架構(英文版)

    [9] ISO/IEC 9797 (所有部分), 信息技術—安全技術—消息鑒別碼(英文版)

    [10] ISO/IEC 8825-1, 信息技術—ASN.1編碼規則—第1部分:基本編碼規則(BER)、正則編碼規則(CER)和可辨識編碼規則(DER)規范(英文版)

    [11] ISO/IEC 10118 (所有部分),信息技術—安全技術—雜湊函數(英文版)

    [12] ISO/IEC 11770-3:2008, 信息技術—安全技術—密鑰管理—第3部分:采用非對稱技術的機制(英文版)

    [13] ISO/IEC 18033-3:2005, 信息技術—安全技術—加密算法—第3部分:分組密碼(英文版)

    [14] ISO/IEC 18033-4:2005, 信息技術—安全技術—加密算法—第4部分:序列密碼(英文版)

    [15] G. Kabatianskii, B. Smeets and T. Johansson, ‘On the cardinality of systematic authentication codes via error correcting codes’, IEEE Transactions on Information Theory 42(2) (1996), 566–578

    [16] K. Khoo, F.-L. Wong and C.-W. Lim, ‘On a construction of short digests for authenticating ad-hoc networks’, in: Proceedings of ICCSA 2009, LNCS vol. 5593, pp. 863-876

    [17] H. Krawczyk, ‘New Hash Functions For Message Authentication’, in: Advances in Cryptology – Eurocrypt 1995, LNCS, Vol. 921, L.C. Guillou and J.-J. Quisquater, eds., Springer, 1995, pp. 301–310

    [18] J.-O. Larsson, ‘Higher layer key exchange techniques for Bluetooth security’, in: Opengroup Conference, Amsterdam, October 2001

    [19] S. Laur and K. Nyberg, ‘Efficient Mutual Data Authentication Using Manually Authenticated Strings’, LNCS, Vol. 4301, D. Pointcheval, ed., Springer, 2006, pp. 90–107

    [20] A.Y. Lindell. ‘Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1’, in: Proceedings of the Cryptographers’ Track at the RSA Conference 2009 on Topics in Cryptology, LNCS, Vol. 5473, M. Fischlin, ed., Springer, 2009, pp. 66–83

    [21] L. H. Nguyen and A. W. Roscoe, ‘Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey’, Journal of Computer Security (to appear). See: http://eprint.iacr.org/2010/206.pdf

    [22] L. H. Nguyen and A. W. Roscoe, ‘Authenticating ad hoc networks by comparison of short digests’, Information & Computation 206(2–4) (2008), 250–271

    [23] L. H. Nguyen and A. W. Roscoe, ‘Efficient group authentication protocol based on human interaction’ in: Proceedings of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, 2006, pp. 9–31. See: http://eprint.iacr.org/2009/150

    [24] L. H. Nguyen and A. W. Roscoe, ‘Separating two roles of hashing in one-way message authentication’, in Proceedings of Workshop on Foundation of Computer Security, Automated Reasoning Protocol Security Analysis, and Issues in the Theory of Security, 2008, pp. 195–209. See: http://eprint.iacr.org/2009/003

    [25] S. Pasini and S. Vaudenay, ‘SAS-based Authenticated Key Agreement’, in Proceedings of International Conference on Practice and Theory in Public Key Cryptography (PKC 2006), LNCS, Vol. 3958, M. Yung, Y. Dodis, A. Kiayias and T. Malkin, eds., Springer, 2006, pp. 395–409

    [26] I.S. Reed and G. Solomon, ‘Polynomial codes over certain finite fields’, SIAM Journal 8 (1960), 300–304

    [27] D.R. Stinson, ‘Universal Hashing and Authentication Codes’, in Advances in Cryptology – Crypto 1991, LNCS, Vol. 576, J. Feigenbaum, ed., Springer, 1992, pp. 74–85

    [28] D.R. Stinson, ‘Cryptography – Theory and Practice’, CRC Press, 2002, 2nd edition

    [29] SHAMAN Project Deliverable D13 (Annex 2), Final technical report – Workpackage 2 – Security for distributed terminals, 2003. Available at http://www.ist-shaman.org/

    [30] S. Vaudenay, ‘Secure Communications over Insecure Channels Based on Short Authenticated Strings’, in: Advances in Cryptology – Crypto 2005, LNCS, Vol. 3621, V. Shoup, ed., Springer, 2005, pp. 309-326

    [31] M.N. Wegman and J.L. Carter, ‘New Hash Functions and Their Use in Authentication and Set Equality’, Journal of Computer and System Sciences 22(3) (1981), 265–279

    [32] F.-L. Wong and F. Stajano, ‘Multi-channel Protocols’, in Proceedings of the 13th International Workshop on Security Protocols, LNCS, Vol. 4631, B. Christianson, B. Crispo, J.A. Malcolm and M. Roe, eds., Springer, 2005, pp. 128–132

    [33] F.-L. Wong and F. Stajano, ‘Multi-channel Security Protocols’, IEEE Pervasive computing 6(4) (2007), 31–39

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类