Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, January 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering
, 22(1):6–15, January 1996.Google Scholar
Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). In Proceedings of the First IFIP International Conference on Theoretical Computer Science
, volume 1872 of Lecture Notes in Computer Science
, pages 3–22. Springer-Verlag, August 2000.Google Scholar
Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, and Gene Tsudik. On traveling incognito. Computer Networks
, 31(8):871–884, 1999.CrossRefGoogle Scholar
Mihir Bellare, Alexandra Boldyreva, Anand Desai, and David Pointcheval. Anonymous encryption. Unpublished manuscript, 2000.
V. Bharghavan and C. V. Ramamoorthy. Security issues in mobile communications. In Proceedings of the Second International Symposium on Autonomous Decentralized Systems, pages 19–24, 1995.
Specification of the Bluetooth system (core, v1.0b). On the Web at http://www.bluetooth.com
, December 1, 1999.
Jan Camenisch and Anna Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Birgit Pfitzmann, editor, Advances in Cryptology—EUROCRYPT 2001
, volume 2045 of Lecture Notes in Computer Science
, pages 93–118. Springer-Verlag, 2001.CrossRefGoogle Scholar
Luca Cardelli. Mobility and security. In F.L. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, NATO Science Series, pages 1–37. IOS Press, 2000. Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999).
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Association for Computing Machinery, 24(2):84–88, February 1981.
Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(7):533–535, August 1981.
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. On the Web at http://www.ietf.cnri.reston.va.us/rfc/rfc2693.txt
, September 1999.
Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann. MIXes in mobile communication systems: Location management with privacy. In Ross J. Anderson, editor, Information hiding: First international workshop
, volume 1174 of Lecture Notes in Computer Science
, pages 121–135. Springer-Verlag, 1996.Google Scholar
Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol: Version 3.0. On the Web at http://home.netscape.com/newsref/std/SSL.html
, March 1996.
Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28:270–299, April 1984.
Markus Jakobsson. Privacy vs. Authenticity
. PhD thesis, University of California, San Diego, 1997.Google Scholar
Markus Jakobsson, Kazue Sako, and Russell Impagliazzo. Designated verifier proofs and their applications. In Ueli Maurer, editor, Advances in Cryptology— EUROCRYPT 96
, volume 1070 of Lecture Notes in Computer Science
, pages 143–154. Springer-Verlag, 1996.Google Scholar
Markus Jakobsson and Susanne Wetzel. Security weaknesses in Bluetooth. In Topics in Cryptology-CT-RSA 2001, Proceedings of the Cryptographer’s Track at RSA Conference 2001
, volume 2020 of Lecture Notes in Computer Science
, pages 176–191. Springer-Verlag, 2001.CrossRefGoogle Scholar
Hugo Krawczyk. SKEME: A versatile secure key exchange mechanism for internet. In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security
, February 1996. Available at http://bilbo.isu.edu/sndss/sndss96.html
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992.
Arjen K. Lenstra and Eric R. Verheul. The XTR public key system. In Mihir Bellare, editor, Advances in Cryptology—CRYPT0 2000
, volume 1880 of Lecture Notes in Computer Science
, pages 1–19. Springer-Verlag, 2000.CrossRefGoogle Scholar
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
Refik Molva, Didier Samfat, and Gene Tsudik. Authentication of mobile users. IEEE Network, 8(2):26–35, March/April 1994.
Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM
, 21(12):993–999, December 1978.Google Scholar
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security
, 6(1–2):85–128, 1998.Google Scholar
Andreas Pfitzmann and Michael Waidner. Networks without user observability. Computers and Security, 6(2):158–166, April 1987.
Charles Rackoff and Daniel R. Simon. Cryptographic defense against traffic analysis. In Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, pages 672–681, 1993.
Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Protocols using anonymous connections: Mobile applications. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Security Protocols: 5th International Workshop
, volume 1361 of Lecture Notes in Computer Science
, pages 13–23. Springer-Verlag, 1997.CrossRefGoogle Scholar
Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In Colin Boyd, editor, Advances in Cryptology—ASIACRYPT 2001
, volume 2248 of Lecture Notes in Computer Science
, pages 552–565. Springer-Verlag, 2001.CrossRefGoogle Scholar
Didier Samfat, Refik Molva, and N. Asokan. Untraceability in mobile networks. In Proceedings of the First Annual International Conference on Mobile Computing and Networking (MobiCom 1995), pages 26–36, 1995.
Adi Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and David Chaum, editors, Advances in Cryptology—CRYPTO 84
, volume 196 of Lecture Notes in Computer Science
, pages 47–53. Springer-Verlag, 1984.CrossRefGoogle Scholar
Alex C. Snoeren and Hari Balakrishnan. An end-to-end approach to host mobility. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pages 155–166, 2000.
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), pages 275–283, 2000.