Attacks on some RSA signatures
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
An Impersonation-Proof Identity Verfication Scheme
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Cryptanalysis and protocol failures
Communications of the ACM
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Using the ASTRAL model checker to analyze mobile IP
Proceedings of the 21st international conference on Software engineering
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Authentication tests and the structure of bundles
Theoretical Computer Science
SPINS: security protocols for sensor networks
Wireless Networks
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Key distribution techniques for sensor networks
Wireless sensor networks
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Intruder deduction for the equational theory of Abelian groups with distributive encryption
Information and Computation
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Hi-index | 0.02 |
A key distribution protocol is proposed for digital mobile communication systems. The protocol can be used with a star-type network. User terminals have a constraint of being hardware-limited.Security of the protocol is discussed. A countermeasure is proposed to cope with a possible active attack by a conspiracy of two opponents.