Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
An analysis of affine coordinates for pairing computation
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Challenging the feasibility of authentication mechanisms for P2P live streaming
Proceedings of the 6th Latin America Networking Conference
Identification in infrastructureless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Attractive subfamilies of BLS curves for implementing high-security pairings
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
SP 800-135 Rev. 1. Recommendation for Existing Application-Specific Key Derivation Functions
SP 800-135 Rev. 1. Recommendation for Existing Application-Specific Key Derivation Functions
OpenHSM: an open key life cycle protocol for public key infrastructure's hardware security modules
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
The security impact of a new cryptographic library
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Improved exponentiation and key agreement in the infrastructure of a real quadratic field
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Factor-4 and 6 (de)compression for values of pairings using trace maps
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Shorter IBE and signatures via asymmetric pairings
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
A Secure Correspondent Router Protocol for NEMO Route Optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
MinimaLT: minimal-latency networking through better security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.