Authenticating ad hoc networks by comparison of short digests
From MaRDI portal
Publication:2482445
DOI10.1016/J.IC.2007.07.010zbMATH Open1148.68327OpenAlexW2098395501MaRDI QIDQ2482445FDOQ2482445
Authors: L. H. Nguyen, A. W. Roscoe
Publication date: 16 April 2008
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://ora.ox.ac.uk/objects/uuid:3e19d041-77a8-42de-a2d0-f464a6166b75
Recommendations
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10) Network protocols (68M12)
Cites Work
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Title not available (Why is that?)
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Authenticated key exchange secure against dictionary attacks
- Title not available (Why is that?)
- The computational complexity of universal hashing
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Universally Composable Password-Based Key Exchange
- Title not available (Why is that?)
- Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Title not available (Why is that?)
- Financial Cryptography
- Topics in Cryptology – CT-RSA 2006
- Public Key Cryptography - PKC 2006
Cited In (11)
- Efficient Mutual Data Authentication Using Manually Authenticated Strings
- Practical unconditionally secure two-channel message authentication
- Digital friend-or-foe authentication
- Title not available (Why is that?)
- Title not available (Why is that?)
- Authentication protocol using an identifier in an ad hoc network environment
- Financial Cryptography
- Selected Areas in Cryptography
- Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Secure node discovery in ad-hoc networks and applications
- Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication
This page was built for publication: Authenticating ad hoc networks by comparison of short digests
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2482445)