Dynamic cryptographic subscriber-device identity binding for subscriber mobility MF Nakhjiri, K Hoeper, A Medvinsky US Patent 8,555,361, 2013 | 69 | 2013 |
Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation K Hoeper, G Gong Centre for Applied Cryptographic Research (CACR) at the University of …, 2006 | 68 | 2006 |
Key revocation for identity-based schemes in mobile ad hoc networks K Hoeper, G Gong Ad-Hoc, Mobile, and Wireless Networks: 5th International Conference, ADHOC …, 2006 | 53 | 2006 |
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors K Gudeth, M Pirretti, K Hoeper, R Buskey Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones …, 2011 | 41 | 2011 |
Models of authentication in ad hoc networks and their related network properties K Hoeper, G Gong International Association for Cryptologic Research, 2004 | 36 | 2004 |
Where EAP security claims fail K Hoeper, L Chen The fourth international conference on heterogeneous networking for quality …, 2007 | 33 | 2007 |
Pre-authentication and authentication models in ad hoc networks K Hoeper, G Gong Wireless Network Security, 65-82, 2007 | 27 | 2007 |
Bootstrapping security in mobile ad hoc networks using identity-based schemes K Hoeper, G Gong Security in Distributed and Networking Systems, 313-337, 2007 | 21 | 2007 |
Identity-based key exchange protocols for ad hoc networks K Hoeper, G Gong Proceedings of the Canadian Workshop on Information Theory (CWIT’05), 127-130, 2005 | 21 | 2005 |
Distribution of EAP-based keys for handover and re-authentication K Hoeper, M Nakhjiri, Y Ohba | 20 | 2010 |
Recommendation for EAP Methods Used in Wireless Network Access Authentication K Hoeper, L Chen NIST Special Publication 800, 120, 2009 | 19 | 2009 |
Channel binding support for eap methods C Clancy, K Hoeper draft-clancy-emu-chbind-04 (work in progress), 2008 | 15 | 2008 |
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks K Hoeper, G Gong International Journal of Security and Networks 2 (3-4), 239-250, 2007 | 14 | 2007 |
Using the EAP framework for fast media independent handover authentication A Izquierdo, N Golmie, K Hoeper, L Chen 4th International ICST Conference on Wireless Internet, 2010 | 12 | 2010 |
Authentication and key exchange in mobile ad hoc networks K Hoeper University of Waterloo, 2007 | 12 | 2007 |
An inconvenient truth about tunneled authentications K Hoeper, L Chen IEEE Local Computer Network Conference, 416-423, 2010 | 11 | 2010 |
Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis/Katrin Hoeper, Guang Gong K Hoeper Security and Privacy for Emerging Areas in Communication Networks. Waterloo …, 2009 | 9 | 2009 |
Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks K Hoeper, G Gong First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 9 | 2005 |
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation/Katrin Hoeper, Guang Gong K Hoeper Security and Privacy for Emerging Areas in Communication Networks …, 2006 | 6 | 2006 |
Efficient key exchange protocols for wireless networks and mobile devices K Hoeper, G Gong Cace. uwaterloo. ca, 1-18, 2005 | 6 | 2005 |