Tài liệu tham khảo |
Loại |
Chi tiết |
1. Biham E, Duneklman O. Cryptanalysis of the A5/1 GSM stream cipher. Progress in Cryptology—INDOCRYPT 2000. Lecture Notes in Computer Science. Volume 1977.Springer-Verlag; 2000. p 43–51 |
Sách, tạp chí |
Tiêu đề: |
Cryptanalysis of the A5/1 GSM stream cipher |
Tác giả: |
Biham E, Duneklman O |
Nhà XB: |
Springer-Verlag |
Năm: |
2000 |
|
2. Biryukov A, Shamir A, Wagner D. Real time cryptanalysis of A5/1 on a PC. Fast Software Encryption—FSE 2000. Lecture Notes in Computer Science. Volume 1978. Springer- Verlag; 2000. p 1–13 |
Sách, tạp chí |
Tiêu đề: |
Real time cryptanalysis of A5/1 on a PC |
Tác giả: |
Biryukov A, Shamir A, Wagner D |
Nhà XB: |
Springer- Verlag |
Năm: |
2000 |
|
8. Colbourn CJ, Dinitz JH. The CRC Handbook of Combinatorial Designs. Boca Raton: CRC Press; 1996 |
Sách, tạp chí |
Tiêu đề: |
The CRC Handbook of Combinatorial Designs |
Tác giả: |
Colbourn CJ, Dinitz JH |
Nhà XB: |
CRC Press |
Năm: |
1996 |
|
9. Deb B, Bhatnagar S, Nath B. RelnForM: reliable information forwarding using multiple paths in sensor networks. Proceedings of 28th Annual IEEE International Conference on Local Computer Networks (LCN ’03); October, 2003; p 406–415 |
Sách, tạp chí |
Tiêu đề: |
RelnForM: reliable information forwarding using multiple paths in sensor networks |
Tác giả: |
Deb B, Bhatnagar S, Nath B |
Nhà XB: |
Proceedings of 28th Annual IEEE International Conference on Local Computer Networks (LCN ’03) |
Năm: |
2003 |
|
15. Eisentr¨ager K, Lauter K, Montgomery PL. Improved Weil and Tate pairings for elliptic and hyperelliptic curves. Algorithmic Number Theory, 6th International Symposium, ANTSVI, Burlington, VT, USA, June 13–18, 2004. Lecture Notes in Computer Science. Volume 3076. Springer-Verlag; 2004. p 169–183 |
Sách, tạp chí |
Tiêu đề: |
Improved Weil and Tate pairings for elliptic and hyperelliptic curves |
Tác giả: |
Eisenträger K, Lauter K, Montgomery PL |
Nhà XB: |
Lecture Notes in Computer Science |
Năm: |
2004 |
|
16. Fluhrer SR, Lucks S. Analysis of E 0 encryption system. Selected Areas in Cryptology—SAC 2001. Lecture Notes in Computer Science. Volume 2259. Springer-Verlag; 2001 |
Sách, tạp chí |
Tiêu đề: |
Analysis of E 0 encryption system |
Tác giả: |
Fluhrer SR, Lucks S |
Nhà XB: |
Springer-Verlag |
Năm: |
2001 |
|
18. Golic JD. Cryptanalysis of alleged A5 stream cipher. Advances of Cryptology—EUROCRYPT’97. Lecture Notes in Computer Science. Volume 1233. Springer-Verlag;1997. p 239–255 |
Sách, tạp chí |
Tiêu đề: |
Cryptanalysis of alleged A5 stream cipher |
Tác giả: |
Golic JD |
Nhà XB: |
Springer-Verlag |
Năm: |
1997 |
|
19. Golic JD, Bagini V, Morgari G. Linear cryptanalysis of Bluetooth stream cipher. Advances in Cryptology—EUROCRYPT 2002. Lecture Notes in Computer Science. Volume 2332.Springer-Verlag 2002. p 238–255 |
Sách, tạp chí |
Tiêu đề: |
Advances in Cryptology—EUROCRYPT 2002 |
Tác giả: |
Golic JD, Bagini V, Morgari G |
Nhà XB: |
Springer-Verlag |
Năm: |
2002 |
|
20. Gura N, Patel A, Wander A, Eberle H, Shantz SC. Comparing elliptic curve cryptography and RSA on 8-bit CPUs, CHES, 2004. Lecture Notes in Computer Science. Volume 3156.Springer-Verlag; 2004. p 119–132 |
Sách, tạp chí |
Tiêu đề: |
Comparing elliptic curve cryptography and RSA on 8-bit CPUs |
Tác giả: |
Gura N, Patel A, Wander A, Eberle H, Shantz SC |
Nhà XB: |
Springer-Verlag |
Năm: |
2004 |
|
23. Hermelin M, Nyberg K. Correlation properties of Bluetooth combiner. Information Se- curity and Cryptology—ICISC’99. Lecture Notes in Computer Science. Volume 1787.Springer-Verlag; 2000. p 17–29 |
Sách, tạp chí |
Tiêu đề: |
Correlation properties of Bluetooth combiner |
Tác giả: |
Hermelin M, Nyberg K |
Nhà XB: |
Springer-Verlag |
Năm: |
2000 |
|
25. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and counter- measures. Elsevier’s Ad Hoc Netw J (Special Issue on Sensor Network Applications and Protocols) 2003;1(2–3):293–315 |
Sách, tạp chí |
Tiêu đề: |
Secure routing in wireless sensor networks: attacks and counter- measures |
Tác giả: |
Karlof C, Wagner D |
Nhà XB: |
Elsevier’s Ad Hoc Netw J |
Năm: |
2003 |
|
28. Lee J, Stinson D. A combinatorial approach to key pre-distribution for distributed sensor networks. IEEE Wireless Computing and Networking Conference (WCNC 2005); New Orleans, LA, USA; 2005 |
Sách, tạp chí |
Tiêu đề: |
A combinatorial approach to key pre-distribution for distributed sensor networks |
Tác giả: |
Lee J, Stinson D |
Nhà XB: |
IEEE Wireless Computing and Networking Conference (WCNC 2005) |
Năm: |
2005 |
|
31. Manulis M. Contributory group key agreement protocols, revisited for mobile ad hoc groups. Proceedings of the MASS; 2005 |
Sách, tạp chí |
Tiêu đề: |
Contributory group key agreement protocols, revisited for mobile ad hoc groups |
Tác giả: |
Manulis M |
Nhà XB: |
Proceedings of the MASS |
Năm: |
2005 |
|
32. Maximov A. Cryptanalysis of the “Grain” family of stream ciphers. ACM Symposium on Information, Computation and Communications Security (ASI–ACCS ’06); 2006. p 283–288 |
Sách, tạp chí |
|
34. Newsome J, Shi E, Song D, Perrig A. The Sybil attack in sensor networks: analysis and defenses. Proceedings of the IEEE International Conference on Information Processing in Sensor Networks; April 2004 |
Sách, tạp chí |
Tiêu đề: |
The Sybil attack in sensor networks: analysis and defenses |
Tác giả: |
Newsome J, Shi E, Song D, Perrig A |
Nhà XB: |
Proceedings of the IEEE International Conference on Information Processing in Sensor Networks |
Năm: |
2004 |
|
38. Przydatek B, Song D, Perrig A. SIA: security information aggregation in sensor networks.Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems; 2003. p 255–265 |
Sách, tạp chí |
Tiêu đề: |
SIA: security information aggregation in sensor networks |
Tác giả: |
Przydatek B, Song D, Perrig A |
Nhà XB: |
Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems |
Năm: |
2003 |
|
42. Stinson D. Combinatorial Designs: Constructions and Analysis. New York: Springer; 2003 |
Sách, tạp chí |
Tiêu đề: |
Combinatorial Designs: Constructions and Analysis |
Tác giả: |
Stinson D |
Nhà XB: |
Springer |
Năm: |
2003 |
|
47. SIG Bluetooth. Bluetooth specification. Available at http://www.bluetooth.com (accessed on Aug 25, 2006) |
Sách, tạp chí |
Tiêu đề: |
Bluetooth specification |
Tác giả: |
SIG Bluetooth |
Năm: |
2006 |
|
3. Blom R. An optimal class of symmetric key generation systems. Proceedings of Eurocrypt 1984; LNCS. Volume 209. 1985. p 335–338 |
Khác |
|
4. Boyd C, Gonz´alez Nieto JM. Round-optimal contributory conference key agreement.Public Key Cryptography, PKC 2003. Lecture Notes in Computer Science. Volume 2567.Springer-Verlag; 2003. p 161–174 |
Khác |
|