Maurizio Adriano Strangio

According to our database1, Maurizio Adriano Strangio authored at least 16 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices.
CoRR, 2015

2013
On the Security of Wang's Provably Secure Identity-based Key Agreement Protocol.
CoRR, 2013

2011
On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011

2008
Establishing secure links in low-rate wireless personal area networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

On the Use of "Qualified" Digital Signatures.
Proceedings of the ICE-B 2008, 2008

2007
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Revisiting an Efficient Elliptic Curve Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip.
EURASIP J. Embed. Syst., 2007

2006
Mobile Local Macropayments: Security and Prototyping.
IEEE Pervasive Comput., 2006

Password-authenticated Key Exchange using Efficient MACs.
J. Comput., 2006

On the Resilience of Key Agreement Protocols to Key Compromise Impersonation.
IACR Cryptol. ePrint Arch., 2006

An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol.
Proceedings of the The First International Conference on Availability, 2006

2005
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Local Authentication with Bluetooth enabled Mobile Devices.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005


  Loading...