Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
CRYPTO '88 Proceedings on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
KryptoKnight Authentication and Key Distribution System
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Security in Wireless Communication
Wireless Personal Communications: An International Journal
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A peer-to-peer approach to wireless LAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Mobile EC service applications by privacy management
ICWE'03 Proceedings of the 2003 international conference on Web engineering
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications
Security services architecture for Secure Mobile Grid Systems
Journal of Systems Architecture: the EUROMICRO Journal
International Journal of Mobile Communications
Deposit-case attack against secure roaming
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
SP'04 Proceedings of the 12th international conference on Security Protocols
Efficient anonymous roaming and its security analysis
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Anonymous channel and authentication in wireless communications
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
MNPA: a mobile network privacy architecture
Computer Communications
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |