This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
RFC Downloads
Cited By
- Aggarwal S and Kaddoum G (2024). Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems, IEEE Transactions on Network and Service Management, 21:5, (5768-5780), Online publication date: 1-Oct-2024.
- Bhaumik R, Chakraborty B, Choi W, Dutta A, Govinden J and Shen Y The Committing Security of MACs with Applications to Generic Composition Advances in Cryptology – CRYPTO 2024, (425-462)
- Kromes R and Verdier F (2024). Accelerating Blockchain Applications on IoT Architecture Models—Solutions and Drawbacks, Distributed Ledger Technologies: Research and Practice, 3:2, (1-24), Online publication date: 30-Jun-2024.
- Bhattacharjee A, Bhaumik R, Dutta A, Nandi M and Raychaudhuri A (2024). BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers, Designs, Codes and Cryptography, 92:1, (13-49), Online publication date: 1-Jan-2024.
- Bardhi E, Conti M, Lazzeretti R and Losiouk E (2023). Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey, IEEE Communications Surveys & Tutorials, 25:4, (2427-2455), Online publication date: 1-Oct-2023.
- Backendal M, Bellare M, Günther F and Scarlata M When Messages Are Keys: Is HMAC a Dual-PRF? Advances in Cryptology – CRYPTO 2023, (661-693)
- Reisinger T, Wagner I and Boiten E (2022). Security and Privacy in Unified Communication, ACM Computing Surveys, 55:3, (1-36), Online publication date: 30-Apr-2023.
- Jiang H, Han J, Zhang Z, Ma Z and Wang H (2023). Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems, IEEE Transactions on Information Forensics and Security, 18, (5069-5081), Online publication date: 1-Jan-2023.
- Gunsing A Block-Cipher-Based Tree Hashing Advances in Cryptology – CRYPTO 2022, (205-233)
- Davis H, Diemert D, Günther F and Jager T On the Concrete Security of TLS 1.3 PSK Mode Advances in Cryptology – EUROCRYPT 2022, (876-906)
- Akestoridis D, Sekar V and Tague P On the Security of Thread Networks Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (233-244)
- Josephlal E, Adepu S, Yang Z and Zhou J (2021). Enabling isolation and recovery in PLC redundancy framework of metro train systems, International Journal of Information Security, 20:6, (783-795), Online publication date: 1-Dec-2021.
- Olney B and Karam R (2021). WATERMARCH: IP Protection Through Authenticated Obfuscation in FPGA Bitstreams, IEEE Embedded Systems Letters, 13:3, (81-84), Online publication date: 1-Sep-2021.
- Luo Y, Su Z, Zheng W, Chen Z, Wang F, Zhang Z and Chen J (2021). A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems, ACM Transactions on Internet Technology, 21:2, (1-21), Online publication date: 23-Jun-2021.
- Yang Z, Yin C, Jin C, Ning J and Zhou J Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, (17-28)
- Wang X, Gu C, Wei F, Lu S and Wang D (2021). Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
- Chase M, Perrin T and Zaverucha G The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (1445-1459)
- Frymann N, Gardham D, Kiefer F, Lundberg E, Manulis M and Nilsson D Asynchronous Remote Key Generation Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (939-954)
- Chaturvedi R and Chand S (2020). Multipath TCP security over different attacks, Transactions on Emerging Telecommunications Technologies, 31:9, Online publication date: 14-Sep-2020.
- Mishra T, Chantem T and Gerdes R TEECheck Proceedings of the 28th International Conference on Real-Time Networks and Systems, (128-138)
- Kwon A, Lu D and Devadas S XRD Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (759-776)
- Benyamina Z, Benahmed K and Bounaama F (2019). ANEL, Computer Networks: The International Journal of Computer and Telecommunications Networking, 164:C, Online publication date: 9-Dec-2019.
- Ullrich F, Classen J, Eger J and Hollick M Vacuums in the cloud Proceedings of the 13th USENIX Conference on Offensive Technologies, (7-7)
- Ying X, Bernieri G, Conti M and Poovendran R TACAN Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, (23-34)
- Desai S, Alhadad R, Chilamkurti N and Mahmood A (2019). A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure, Cluster Computing, 22:1, (43-69), Online publication date: 1-Mar-2019.
- Kohnhäuser F, Büscher N and Katzenbeisser S SALAD Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (329-342)
- Cheng H, Liu J, Mao J, Wang M, Chen J, Bian J and Hu C (2018). A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
- Ferrag M, Maglaras L, Argyriou A, Kosmanos D and Janicke H (2018). Security for 4G and 5G cellular networks, Journal of Network and Computer Applications, 101:C, (55-82), Online publication date: 1-Jan-2018.
- Blundo C, Orciuoli F and Parente M (2017). An AmI-based and privacy-preserving shopping mall model, Human-centric Computing and Information Sciences, 7:1, (1-28), Online publication date: 1-Dec-2017.
- Almahmoud A, Colombo M, Yeun C and Al-Muhairi H (2017). Enhancement of Key Derivation in Web Service Security, Wireless Personal Communications: An International Journal, 97:4, (5171-5184), Online publication date: 1-Dec-2017.
- Song C, Ristenpart T and Shmatikov V Machine Learning Models that Remember Too Much Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (587-601)
- Kieselmann O, Wacker A and Schiele G k-rAC Proceedings of the 12th International Conference on Availability, Reliability and Security, (1-10)
- Bhatia T and Verma A (2017). Data security in mobile cloud computing paradigm, The Journal of Supercomputing, 73:6, (2558-2631), Online publication date: 1-Jun-2017.
- Achermann R, Dalton C, Faraboschi P, Hoffmann M, Milojicic D, Ndu G, Richardson A, Roscoe T, Shaw A and Watson R Separating Translation from Protection in Address Spaces with Dynamic Remapping Proceedings of the 16th Workshop on Hot Topics in Operating Systems, (118-124)
- Felsch D, Mainka C, Mladenov V and Schwenk J SECRET Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (835-848)
- Tiloca M, Gehrmann C and Seitz L (2017). On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake, International Journal of Information Security, 16:2, (173-193), Online publication date: 1-Apr-2017.
- Ferrag M, Maglaras L, Janicke H, Jiang J, Shu L and Ghorbel M (2017). Authentication Protocols for Internet of Things, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
- Maleh Y, Ezzati A and Belaissaoui M DoS Attacks Analysis and Improvement in DTLS Protocol for Internet of Things Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, (1-7)
- Lee J, Kim T and Huh J (2016). Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors, IEEE Transactions on Computers, 65:11, (3384-3397), Online publication date: 1-Nov-2016.
- Abt S and Baier H Correlating Network Events and Transferring Labels in the Presence of IP Address Anonymisation Proceedings of the 12th Conference on International Conference on Network and Service Management, (64-72)
- Garay J, Kolesnikov V and Mclellan R (2016). MAC Precomputation with Applications to Secure Memory, ACM Transactions on Privacy and Security, 19:2, (1-21), Online publication date: 17-Sep-2016.
- Carmer B and Rosulek M Linicrypt Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816, (416-445)
- Suga T, Nishide T and Sakurai K (2016). Character-based symmetric searchable encryption and its implementation and experiment on mobile devices, Security and Communication Networks, 9:12, (1717-1725), Online publication date: 1-Aug-2016.
- Wu T and Gong G (2016). Two new message authentication codes based on APN functions and stream ciphers, Security and Communication Networks, 9:12, (1864-1871), Online publication date: 1-Aug-2016.
- Dutta A, Nandi M and Paul G One-Key Compression Function Based MAC with Security Beyond Birthday Bound Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy - Volume 9722, (343-358)
- Brasser F, Rasmussen K, Sadeghi A and Tsudik G Remote attestation for low-end embedded devices Proceedings of the 53rd Annual Design Automation Conference, (1-6)
- Brzuska C, Jacobsen H and Stebila D Safely Exporting Keys from Secure Channels Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (670-698)
- Albrecht M and Paterson K Lucky Microseconds Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (622-643)
- Naito Y and Wang L Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$ Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (397-412)
- Gebotys C, White B and Mateos E (2016). Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256, ACM Transactions on Embedded Computing Systems, 15:1, (1-19), Online publication date: 20-Feb-2016.
- Seuschek H, Heyszl J and De Santis F A Cautionary Note Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, (7-12)
- Teichel K, Sibold D and Milius S First Results of a Formal Analysis of the Network Time Security Specification Proceedings of the Second International Conference on Security Standardisation Research - Volume 9497, (218-245)
- Goldberg S, Xiao D, Tromer E, Barak B and Rexford J (2015). Path-quality monitoring in the presence of adversaries, IEEE/ACM Transactions on Networking, 23:6, (1729-1741), Online publication date: 1-Dec-2015.
- Wang T, Liu Y, Pei Q and Hou T Location-restricted Services Access Control Leveraging Pinpoint Waveforming Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (292-303)
- Ghali C, Schlosberg M, Tsudik G and Wood C Interest-Based Access Control for Content Centric Networks Proceedings of the 2nd ACM Conference on Information-Centric Networking, (147-156)
- Kieselmann O, Kopal N and Wacker A A Novel Approach to Data Revocation on the Internet Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481, (134-149)
- Zeng L, Wang Y and Feng D CloudSky Proceedings of the 15th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (352-361)
- Fabian B, Ermakova T and Junghanns P (2015). Collaborative and secure sharing of healthcare data in multi-clouds, Information Systems, 48:C, (132-150), Online publication date: 1-Mar-2015.
- Boudguiga A, Klaudel W and Wesolowski J On the performance of freescale i.MX6 cryptographic acceleration and assurance module Proceedings of the 2015 Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, (1-8)
- Chen J, Shi J and Zhang Y (2015). EPPDC, International Journal of Distributed Sensor Networks, 2015, (60-60), Online publication date: 1-Jan-2015.
- Woskowski C A Pragmatic Approach towards Safe and Secure Medical Device Integration Proceedings of the 33rd International Conference on Computer Safety, Reliability, and Security - Volume 8666, (342-353)
- Isaac J and Zeadally S (2014). Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model, Computing, 96:7, (587-611), Online publication date: 1-Jul-2014.
- Van Herrewege A and Verbauwhede I Software Only, Extremely Compact, Keccak-based Secure PRNG on ARM Cortex-M Proceedings of the 51st Annual Design Automation Conference, (1-6)
- Braun B, Johns M, Koestler J and Posegga J PhishSafe Proceedings of the 4th ACM conference on Data and application security and privacy, (61-72)
- Winter P, Pulls T and Fuss J ScrambleSuit Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, (213-224)
- Blaner B, Abali B, Bass B, Chari S, Kalla R, Kunkel S, Lauricella K, Leavens R, Reilly J and Sandon P (2013). IBM POWER7+ processor on-chip accelerators for cryptography and active memory expansion, IBM Journal of Research and Development, 57:6, (3-3), Online publication date: 1-Nov-2013.
- Cho J and Chen I (2013). On the tradeoff between altruism and selfishness in MANET trust management, Ad Hoc Networks, 11:8, (2217-2234), Online publication date: 1-Nov-2013.
- Vatsalan D, Christen P and Verykios V (2013). A taxonomy of privacy-preserving record linkage techniques, Information Systems, 38:6, (946-969), Online publication date: 1-Sep-2013.
- Verykios V and Christen P (2013). Privacy-preserving record linkage, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 3:5, (321-332), Online publication date: 1-Sep-2013.
- Yue C Preventing the revealing of online passwords to inappropriate websites with logininspector Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (67-82)
- Johns M, Lekies S, Braun B and Flesch B BetterAuth Proceedings of the 28th Annual Computer Security Applications Conference, (169-178)
- Chen F and Liu A (2012). Privacy- and integrity-preserving range queries in sensor networks, IEEE/ACM Transactions on Networking, 20:6, (1774-1787), Online publication date: 1-Dec-2012.
- Mavrogiannopoulos N, Vercauteren F, Velichkov V and Preneel B A cross-protocol attack on the TLS protocol Proceedings of the 2012 ACM conference on Computer and communications security, (62-72)
- Suga T, Nishide T and Sakurai K Secure keyword search using bloom filter with specified character positions Proceedings of the 6th international conference on Provable Security, (235-252)
- Dodis Y, Ristenpart T, Steinberger J and Tessaro S To Hash or Not to Hash Again? InDifferentiability Results for $$H^2$$ and HMAC Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (348-366)
- Mathi S, Valarmathi M and Ramprasath G A secure and efficient registration for IP mobility Proceedings of the First International Conference on Security of Internet of Things, (210-215)
- Zohner M, Kasper M and Stöttinger M Butterfly-Attack on skein's modular addition Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (215-230)
- Liu A, Kovacs J and Gouda M (2012). A secure cookie scheme, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:6, (1723-1730), Online publication date: 1-Apr-2012.
- Vatsalan D, Christen P and Verykios V An efficient two-party protocol for approximate matching in private record linkage Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (125-136)
- Srivatsa M, Liu L and Iyengar A (2011). EventGuard, ACM Transactions on Computer Systems, 29:4, (1-40), Online publication date: 1-Dec-2011.
- Fournet C, Kohlweiss M and Strub P Modular code-based cryptographic verification Proceedings of the 18th ACM conference on Computer and communications security, (341-350)
- Bösch C, Brinkman R, Hartel P and Jonker W Conjunctive wildcard search over encrypted data Proceedings of the 8th VLDB international conference on Secure data management, (114-127)
- Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey P, McKeown N, Parulkar G, Raghavan B, Rexford J, Arianfar S and Kuptsov D (2011). Architecting for innovation, ACM SIGCOMM Computer Communication Review, 41:3, (24-36), Online publication date: 5-Jul-2011.
- Chhabra S, Rogers B, Solihin Y and Prvulovic M SecureME Proceedings of the international conference on Supercomputing, (108-119)
- Kim D, Chiang J, Hu Y, Perrig A and Kumar P CRAFT Proceedings of the 17th ACM conference on Computer and communications security, (705-707)
- Atzori L, Iera A and Morabito G (2010). The Internet of Things, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2787-2805), Online publication date: 1-Oct-2010.
- Oehler M, Phatak D and Krautheim J Visualizing your key for secure phone calls and language independence Proceedings of the Seventh International Symposium on Visualization for Cyber Security, (64-69)
- Chen F and Liu A SafeQ Proceedings of the 29th conference on Information communications, (2642-2650)
- Smetters D and Good N How users use access control Proceedings of the 5th Symposium on Usable Privacy and Security, (1-12)
- Liu A and Bailey L (2009). PAP, Computer Communications, 32:7-10, (1194-1199), Online publication date: 1-May-2009.
- Pajic M and Mangharam R Anti-jamming for embedded wireless networks Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, (301-312)
- Lindqvist J, Aura T, Danezis G, Koponen T, Myllyniemi A, Mäki J and Roe M Privacy-preserving 802.11 access-point discovery Proceedings of the second ACM conference on Wireless network security, (123-130)
- Chhabra S, Rogers B, Solihin Y and Prvulovic M (2009). Making secure processors OS- and performance-friendly, ACM Transactions on Architecture and Code Optimization, 5:4, (1-35), Online publication date: 1-Mar-2009.
- Ransom S, Pfisterer D and Fischer S Comprehensible security synthesis for wireless sensor networks Proceedings of the 3rd international workshop on Middleware for sensor networks, (19-24)
- Ahamed S and Sharmin M (2008). A trust-based secure service discovery (TSSD) model for pervasive computing, Computer Communications, 31:18, (4281-4293), Online publication date: 1-Dec-2008.
- Constandache I, Yumerefendi A and Chase J Secure control of portable images in a virtual computing utility Proceedings of the 1st ACM workshop on Virtual machine security, (1-8)
- Rubino R An open system for transparent firewall authentication and user traffic identification within corporate intranets Proceedings of the 9th ACM SIGITE conference on Information technology education, (113-118)
- Malasri K and Wang L Design and implementation of a secure wireless mote-based medical sensor network Proceedings of the 10th international conference on Ubiquitous computing, (172-181)
- Palankar M, Iamnitchi A, Ripeanu M and Garfinkel S Amazon S3 for science grids Proceedings of the 2008 international workshop on Data-aware distributed computing, (55-64)
- Adida B Sessionlock Proceedings of the 17th international conference on World Wide Web, (517-524)
- Chang K and Shin K (2008). Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks, ACM Transactions on Information and System Security, 11:3, (1-35), Online publication date: 15-Mar-2008.
- Mehfuz S and Doja M (2008). Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs, Journal of Artificial Evolution and Applications, 2008:R1, (1-16), Online publication date: 1-Jan-2008.
- Zhang Q, Wang J and Li X On the design of fast prefix-preserving IP address anonymization scheme Proceedings of the 9th international conference on Information and communications security, (177-188)
- Sei Y and Honiden S Resilient security for false event detection without loss of legitimate events in wireless sensor networks Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I, (454-470)
- di Vimercati S, Foresti S, Jajodia S, Paraboschi S and Samarati P A data outsourcing architecture combining cryptography and access control Proceedings of the 2007 ACM workshop on Computer security architecture, (63-69)
- Alexander C and Goldberg I Improved user authentication in off-the-record messaging Proceedings of the 2007 ACM workshop on Privacy in electronic society, (41-47)
- Komarova M and Riguidel M Optimized ticket distribution scheme for fast re-authentication protocol (fap) Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, (71-77)
- Guajardo J, Kumar S, Schrijen G and Tuyls P FPGA Intrinsic PUFs and Their Use for IP Protection Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (63-80)
- Abbadi I and Mitchell C Digital rights management using a mobile phone Proceedings of the ninth international conference on Electronic commerce, (185-194)
- Tsaur W and Pai H A new security scheme for on-demand source routing in mobile ad hoc networks Proceedings of the 2007 international conference on Wireless communications and mobile computing, (577-582)
- Boyen X Halting password puzzles Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-16)
- Farrell S and Jensen C "End-by-hop" data integrity Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (142-155)
- Malasri K and Wang L Addressing security in medical sensor networks Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, (7-12)
- Bamberger W, Welter O and Spitz S Mobile phones as secure gateways for message-based ubiquitous communication Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems, (175-188)
- Shi W and Lee H Accelerating memory decryption and authentication with frequent value prediction Proceedings of the 4th international conference on Computing frontiers, (35-46)
- Memon Q, Akhtar S and Aly A Role management in adhoc networks Proceedings of the 2007 spring simulaiton multiconference - Volume 1, (131-137)
- Tseng C, Wang S and Levitt K DRETA Proceedings of the 2nd ACM symposium on Information, computer and communications security, (395-397)
- Safavi-Naini R, Wang S and Desmedt Y Unconditionally secure ring authentication Proceedings of the 2nd ACM symposium on Information, computer and communications security, (173-181)
- Srivatsa M, Iyengar A, Yin J and Liu L A middleware system for protecting against application level denial of service attacks Proceedings of the 7th ACM/IFIP/USENIX international conference on Middleware, (260-280)
- Srivatsa M, Iyengar A, Yin J and Liu L A middleware system for protecting against application level denial of service attacks Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware, (260-280)
- Acs G, Buttyan L and Vajda I (2006). Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 5:11, (1533-1546), Online publication date: 1-Nov-2006.
- Ruiz-Martínez A, Marín-López C, Baño-López L and Skarmeta A A new fair non-repudiation protocol for secure negotiation and contract signing Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-11)
- Lee A, Tabriz P and Borisov N A privacy-preserving interdomain audit framework Proceedings of the 5th ACM workshop on Privacy in electronic society, (99-108)
- Koo J, Koo J and Lee D Secure authentication protocol in mobile IPv6 networks Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III, (548-555)
- Ren K, Lou W, Zeng K, Bao F, Zhou J and Deng R (2006). Routing optimization security in mobile IPv6, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:13, (2401-2419), Online publication date: 15-Sep-2006.
- Guo J, Li Y, Deng R and Chen K Rights protection for data cubes Proceedings of the 9th international conference on Information Security, (359-372)
- Bellare M New proofs for NMAC and HMAC Proceedings of the 26th annual international conference on Advances in Cryptology, (602-619)
- Huang S, Zhu H and Zhang W SAP Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks, (32-es)
- Coskun V, Cayirci E, Levi A and Sancak S (2006). Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, 5:8, (1074-1086), Online publication date: 1-Aug-2006.
- Liu X, Yang X, Wetherall D and Anderson T Efficient and secure source authentication with packet passports Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2, (2-2)
- Bassil C, Serhrouchni A and Rouhana N Simple voice security protocol Proceedings of the 2006 international conference on Wireless communications and mobile computing, (367-372)
- Kim S, Kim K, Jung J and Won D An efficient POP protocol based on the signcryption scheme for the WAP PKI Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (223-232)
- Jeong Y, Lee B, Lee K and Lee S Efficient unilateral authentication mechanism for MIPv6 Proceedings of the 6th international conference on Computational Science - Volume Part I, (908-911)
- Mauw S, van Vessem I and Bos B Forward secure communication in wireless sensor networks Proceedings of the Third international conference on Security in Pervasive Computing, (32-42)
- Zhang Q and Li X An IP address anonymization scheme with multiple access levels Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (793-802)
- Curtmola R, Del Sorbo A and Ateniese G On the performance and analysis of DNS security extensions Proceedings of the 4th international conference on Cryptology and Network Security, (288-303)
- Sivathanu G, Wright C and Zadok E Ensuring data integrity in storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (26-36)
- Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
- Srivatsa M and Liu L Securing publish-subscribe overlay services with EventGuard Proceedings of the 12th ACM conference on Computer and communications security, (289-298)
- Li X, Yang J and Wu Z An NFSv4-Based security scheme for NAS Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications, (130-139)
- Burmester M, Henry P and Kermes L (2005). Tracking cyberstalkers, ACM SIGCAS Computers and Society, 35:3, (2-es), Online publication date: 1-Sep-2005.
- Srivatsa M and Liu L Countering targeted file attacks using locationguard Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (6-6)
- Bono S, Green M, Stubblefield A, Juels A, Rubin A and Szydlo M Security analysis of a cryptographically-enabled RFID device Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (1-1)
- Djemaiel Y, Rekhis S and Boudriga N Adaptive and selective packet marking in communication networks Proceedings of the 9th WSEAS International Conference on Communications, (1-6)
- Celentano D, Fresa A, Longo M, Postiglione F and Robustelli A MIPv6 binding authentication for b3g networks Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet, (170-183)
- Jochen M, Anteneh A, Pollock L and Marvel L (2005). Enabling control over adaptive program transformation for dynamically evolving mobile software validation, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
- Boesgaard M, Christensen T and Zenner E Badger – a fast and provably secure MAC Proceedings of the Third international conference on Applied Cryptography and Network Security, (176-191)
- Jochen M, Anteneh A, Pollock L and Marvel L Enabling control over adaptive program transformation for dynamically evolving mobile software validation Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications, (1-7)
- Park T and Shin K (2005). Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, 4:3, (297-309), Online publication date: 1-May-2005.
- Cvrk L, Zeman V and Komosny D H.323 client-independent security approach Proceedings of the 4th international conference on Networking - Volume Part II, (673-680)
- Eilebrecht L Ciphire mail email encryption and authentication Proceedings of the 9th international conference on Financial Cryptography and Data Security, (211-224)
- Hansen S, Skriver J and Nielson H Using static analysis to validate the SAML single sign-on protocol Proceedings of the 2005 workshop on Issues in the theory of security, (27-40)
- Walfish M, Stribling J, Krohn M, Balakrishnan H, Morris R and Shenker S Middleboxes no longer considered harmful Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (15-15)
- Liu D and Ning P (2004). Multilevel μTESLA, ACM Transactions on Embedded Computing Systems, 3:4, (800-836), Online publication date: 1-Nov-2004.
- Borisov N, Goldberg I and Brewer E Off-the-record communication, or, why not to use PGP Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (77-84)
- Popescu B, Crispo B, Tanenbaum A and Kamperman F A DRM security architecture for home networks Proceedings of the 4th ACM workshop on Digital rights management, (1-10)
- Raffo D, Adjih C, Clausen T and Mühlethaler P An advanced signature system for OLSR Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, (10-16)
- Levi A and Özcan M Practical and secure e-mail system (PractiSES) Proceedings of the Third international conference on Advances in Information Systems, (410-419)
- Song J, Wong V and Leung V A framework of secure location service for position-based ad hoc routing Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (99-106)
- Diab A, Mitschele-Thiel A and Xu J Performance analysis of the mobile IP fast authentication protocol Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (297-300)
- Raghavan B and Snoeren A (2004). A system for authenticated policy-compliant routing, ACM SIGCOMM Computer Communication Review, 34:4, (167-178), Online publication date: 30-Aug-2004.
- Raghavan B and Snoeren A A system for authenticated policy-compliant routing Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (167-178)
- Kungpisdan S, Le P and Srinivasan B A limited-used key generation scheme for internet transactions Proceedings of the 5th international conference on Information Security Applications, (302-316)
- Hong K, Jung S, Lo Iacono L and Ruland C Impacts of security protocols on real-time multimedia communications Proceedings of the 5th international conference on Information Security Applications, (1-13)
- Tubaishat M, Yin J, Panja B and Madria S (2004). A secure hierarchical model for sensor network, ACM SIGMOD Record, 33:1, (7-13), Online publication date: 1-Mar-2004.
- Bhargavan K, Fournet C and Gordon A A semantics for web services authentication Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (198-209)
- Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)
- Bhargavan K, Fournet C and Gordon A (2004). A semantics for web services authentication, ACM SIGPLAN Notices, 39:1, (198-209), Online publication date: 1-Jan-2004.
- Lie D, Thekkath C and Horowitz M (2003). Implementing an untrusted operating system on trusted hardware, ACM SIGOPS Operating Systems Review, 37:5, (178-192), Online publication date: 1-Dec-2003.
- Lie D, Thekkath C and Horowitz M Implementing an untrusted operating system on trusted hardware Proceedings of the nineteenth ACM symposium on Operating systems principles, (178-192)
- Harn L and Hsin W On the security of wireless network access with enhancements Proceedings of the 2nd ACM workshop on Wireless security, (88-95)
- Papadimitratos P and Haas Z Secure data transmission in mobile ad hoc networks Proceedings of the 2nd ACM workshop on Wireless security, (41-50)
- Song J, Wong V, Leung V and Kawamoto Y (2003). Secure routing with tamper resistant module for mobile Ad hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, 7:3, (48-49), Online publication date: 1-Jul-2003.
- Kong J and Hong X ANODR Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (291-302)
- Deng R, Zhou J and Bao F Defending against redirect attacks in mobile IP Proceedings of the 9th ACM conference on Computer and communications security, (59-67)
- Aiello W, Bellovin S, Blaze M, Ioannidis J, Reingold O, Canetti R and Keromytis A Efficient, DoS-resistant, secure key exchange for internet protocols Proceedings of the 9th ACM conference on Computer and communications security, (48-58)
- Bellare M, Kohno T and Namprempre C Authenticated encryption in SSH Proceedings of the 9th ACM conference on Computer and communications security, (1-11)
- Yang C, Hwang M, Li J and Chang T A solution to mobile IP registration for AAA Proceedings of the 7th CDMA international conference on Mobile communications, (329-337)
- Bagnulo M, Alarcos B, Calderón M and Sedano M Providing authentication & authorization mechanisms for active service charging Proceedings of the 3rd international conference on quality of future internet services and internet charging and QoS technologies 2nd international conference on From QoS provisioning to QoS charging, (337-346)
- Staddon J, Balfanz D and Durfee G Efficient tracing of failed nodes in sensor networks Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, (122-130)
- Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
- Sanchez E and Edwards R Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks Proceedings of the 16th International Parallel and Distributed Processing Symposium
- Burnside M, Clarke D, Mills T, Maywah A, Devadas S and Rivest R Proxy-based security protocols in networked mobile devices Proceedings of the 2002 ACM symposium on Applied computing, (265-272)
- Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
- Xu J, Fan J, Ammar M and Moon S On the design and performance of prefix-preserving IP traffic trace anonymization Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (263-266)
- Fu K, Sit E, Smith K and Feamster N Dos and don'ts of client authentication on the web Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
- (2001). The architecture and performance of security protocols in the ensemble group communication system, ACM Transactions on Information and System Security, 4:3, (289-319), Online publication date: 1-Aug-2001.
- Borisov N, Goldberg I and Wagner D Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking, (180-189)
- Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
- Thekkath D, Mitchell M, Lincoln P, Boneh D, Mitchell J and Horowitz M (2000). Architectural support for copy and tamper resistant software, ACM SIGOPS Operating Systems Review, 34:5, (168-177), Online publication date: 1-Dec-2000.
- Thekkath D, Mitchell M, Lincoln P, Boneh D, Mitchell J and Horowitz M (2000). Architectural support for copy and tamper resistant software, ACM SIGARCH Computer Architecture News, 28:5, (168-177), Online publication date: 1-Dec-2000.
- Thekkath D, Mitchell M, Lincoln P, Boneh D, Mitchell J and Horowitz M Architectural support for copy and tamper resistant software Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, (168-177)
- Talwar V and Nahrstedt K Securing RSVP for multimedia applications Proceedings of the 2000 ACM workshops on Multimedia, (153-156)
- Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J and Horowitz M (2000). Architectural support for copy and tamper resistant software, ACM SIGPLAN Notices, 35:11, (168-177), Online publication date: 1-Nov-2000.
- Brown M, Cheung D, Hankerson D, Hernandez J, Kirkup M and Menezes A PGP in constrained wireless devices Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (19-19)
- Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
- Schlaff R (1998). Confidentially using authentication, XRDS: Crossroads, The ACM Magazine for Students, 5:2, (20-22), Online publication date: 1-Nov-1998.
- Joye M and Yen S (1998). ID-based secret-key cryptography, ACM SIGOPS Operating Systems Review, 32:4, (33-39), Online publication date: 1-Oct-1998.
- Mitchell J, Shmatikov V and Stern U Finite-state analysis of SSL 3.0 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (16-16)
- Perkins C and Johnson D Mobility support in IPv6 Proceedings of the 2nd annual international conference on Mobile computing and networking, (27-37)
Recommendations
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can "freely" perform the operation inevitably means ...
CCA-Secure Keyed-Fully Homomorphic Encryption
Proceedings, Part I, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9614To simultaneously achieve CCA security and homomorphic property for encryption, Emura et al. introduced a new cryptographic primitive named keyed-homomorphic encryption, in which homomorphic ciphertext manipulations can only be performed by someone ...