Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda |
Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka |
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Takuma Ueda |
How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Sato, Toshihiro Yamauchi |
Secure Log Transfer by Replacing a Library in a Virtual Machine. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rui Xu 0006, Kirill Morozov, Tsuyoshi Takagi |
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Itsuki Suzuki, Maki Yoshida, Toru Fujiwara |
Generic Construction of GUC Secure Commitment in the KRK Model. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Isobe 0001, Toshihiro Ohigashi, Masakatu Morii |
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jingjing Wang, Kefei Chen, Shixiong Zhu |
Annihilators of Fast Discrete Fourier Spectra Attacks. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto |
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang |
Efficient Secure Primitive for Privacy Preserving Distributed Computations. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
Compact Stateful Encryption Schemes with Ciphertext Verifiability. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang |
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka |
Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai |
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba |
Structured Encryption for Conceptual Graphs. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Toshihiro Yamauchi (eds.) |
Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yiming Jing, Gail-Joon Ahn, Hongxin Hu |
Model-Based Conformance Testing for Android. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque |
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe |
Very Short Critical Path Implementation of AES with Direct Logic Gates. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta |
Boomerang Distinguishers for Full HAS-160 Compression Function. |
IWSEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata |
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Masakatsu Nishigaki (eds.) |
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 |
Nitro: Hardware-Based System Call Tracing for Virtual Machines. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Minoru Kuribayashi |
A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote |
Towards Restricting Plaintext Space in Public Key Encryption. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta |
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto |
Cryptographic Pairings Based on Elliptic Nets. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity-Based Deterministic Signature Scheme without Forking-Lemma. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani |
An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001, Subhamoy Maitra, Shashwat Raizada |
A Theoretical Analysis of the Structure of HC-128. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka |
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis |
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto |
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Portokalidis, Angelos D. Keromytis |
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ryotaro Hayashi 0001, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada |
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. |
IWSEC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lena Wiese |
Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thanh-Ha Le, Maël Berthier |
Mutual Information Analysis under the View of Higher-Order Statistics. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama |
An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lasse Harjumaa, Ilkka Tervonen |
Introducing Mitigation Use Cases to Enhance the Scope of Test Cases. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Miguel Tavares Calafate, Javier Campos, Marga Nácher, Pietro Manzoni, Juan-Carlos Cano |
A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Margus Niitsoo |
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama |
Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska |
Practical Universal Random Sampling. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Sakai 0001, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta |
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Minoru Kuribayashi |
Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi |
Efficient Implementation of Pairing on BREW Mobile Phones. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Alicherry, Angelos D. Keromytis |
Securing MANET Multicast Using DIPLOMA. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kimmo Halunen, Juha Röning |
Preimage Attacks against Variants of Very Smooth Hash. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tomonori Izumida, Kokichi Futatsugi, Akira Mori |
A Generic Binary Analysis Method for Malware. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya |
Automating Security Configuration and Administration: An Access Control Perspective. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001 |
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yamin Liu, Bao Li 0001, Xianhui Lu, Yazhe Zhang |
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Böhme |
Security Metrics and Security Investment Models. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Santanu Sarkar 0001, Sourav Sen Gupta 0001 |
Publishing Upper Half of RSA Decryption Exponent. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Justus, Daniel Loebenberger |
Differential Addition in Generalized Edwards Coordinates. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fumiko Satoh, Naohiko Uramoto |
Validating Security Policy Conformance with WS-Security Requirements. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto |
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yajima, Takeshi Shimoyama |
Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki (eds.) |
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
The Future of Cryptographic Algorithms. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura |
A Generic Construction of Timed-Release Encryption with Pre-open Capability. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction |
1 | Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki |
A Proposal of Efficient Remote Biometric Authentication Protocol. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
zero knowledge interactive proof, secret computing, authentication, biometrics |
1 | Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu |
Strongly Secure Authenticated Key Exchange without NAXOS' Approach. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
AKE, eCK model, NAXOS’ approach, trapdoor test |
1 | S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography |
1 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Koji Nuida |
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint |
1 | Tsuyoshi Takagi, Masahiro Mambo (eds.) |
Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Tamper-Tolerant Software: Modeling and Implementation. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jiali Choy, Huihui Yap |
Impossible Boomerang Attack for Block Cipher Structures. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers |
1 | Xun Yi, Raylin Tso, Eiji Okamoto |
ID-Based Group Password-Authenticated Key Exchange. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
protocol compiler, common reference model, group key agreement, Password-authenticated key exchange |
1 | Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren |
Efficient Intrusion Detection Based on Static Analysis and Stack Walks. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Yuen Cheong, Takeshi Koshiba |
Reducing Complexity Assumptions for Oblivious Transfer. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
trapdoor one-way functions, oblivious transfer |
1 | Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
Bit-Free Collision: Application to APOP Attack. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
bit-free collision, APOP, hash function, MD5, MD4 |
1 | Maciej Grzeskowiak |
On Generating Elements of Orders Dividing p2k±pk+1. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
The Gong-Harn Public Key System, The XTR Public Key System, primes of a special form, solving polynomial equations modulo p |
1 | Takuya Yoshida, Koji Okada |
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe |
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan |
The Superdiversifier: Peephole Individualization for Software Protection. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes |
The Elliptic Curve Discrete Logarithm Problem: State of the Art. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer |
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
Biometric Data, Privacy, Group Signature |
1 | Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis |
Online Network Forensics for Automatic Repair Validation. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
software self-healing, automatic repair validation |
1 | Naoki Ogura, Shigenori Uchiyama |
Remarks on the Attack of Fouque et al. against the lIC Scheme. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Koji Chida, Katsumi Takahashi |
Privacy Preserving Computations without Public Key Cryptographic Operation. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen |
Involuntary Information Leakage in Social Network Services. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo |
Return Value Predictability Profiles for Self-healing. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
anonamly detection, self-healing, behavior profiling |
1 | Dong Chan An, So Mi Park, Seog Park |
Efficient Secure Labeling Method under Dynamic XML Data Streams. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
Labeling Method, Dynamic XML, Access Control, Query Processing, Data streams |
1 | Kanta Matsuura, Eiichiro Fujisaki (eds.) |
Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Chik How Tan |
Signcryption Scheme in Multi-user Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
decisional bilinear Diffie-Hellman assumption, Signcryption |
1 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
short signature, Batch verification |
1 | Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han |
Detecting Java Theft Based on Static API Trace Birthmark. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Anongporn Salaiwarakul, Mark Ryan 0001 |
Analysis of a Biometric Authentication Protocol for Signature Creation Application. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Long-Short-Key Primitive and Its Applications to Key Security. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine |
A Novel Framework for Watermarking: The Data-Abstracted Approach. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda |
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Koji Chida, Osamu Shionoiri, Atsushi Kanai |
Secure Anonymous Communications with Practical Anonymity Revocation Scheme. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Layouni |
Accredited Symmetrically Private Information Retrieval. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Symmetrically private information retrieval, policy enforcement, anonymous credentials |
1 | Pino Caballero-Gil, Cándido Caballero-Gil |
A Global Authentication Scheme for Mobile Ad-Hoc Networks. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
MANETs, Authentication, Access Control |