Privacy and Security of Personal Information, Economics of Information Security of Advances in Information Security, pp.179-186, 2004. ,
DOI : 10.1007/1-4020-8090-5_14
Privacy and authentication for wireless local area networks, IEEE Personal Communications, vol.1, issue.1, pp.25-31, 1994. ,
DOI : 10.1109/98.295357
A Study of the MD5 Attacks: Insights and Improvements, Proceedings of the 13th international conference on Fast Software Encryption, FSE'06, pp.262-277, 2006. ,
DOI : 10.1007/11799313_17
Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, issue.0, 2013. ,
Musings on the wang et al. md5 collision. Cryptology ePrint Archive, Report, vol.264, 2004. ,
Tunnels in hash functions: Md5 collisions within a minute, Cryptology ePrint Archive Report, vol.105, 2006. ,
Parallelization of john the ripper (jtr) using mpi, 2004. ,
Message authentication using hash functions: The HMAC construction, RSA Laboratories' CryptoBytes, 1996. ,
I know who you will meet this evening, IEEE WoWMoM, 2012. ,
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294 ,
DOI : 10.1145/2426656.2426685
Fast dictionary attacks on passwords using time-space tradeoff, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.364-372, 2005. ,
DOI : 10.1145/1102120.1102168
Measuring crowds or people counting: What is the difference?, 2012. ,
Stronger Key Derivation via Sequential Memory-Hard Functions, USENIX Annual Technical Conference, FREENIX Track, 2009. ,
A Future-Adaptable Password Scheme, USENIX Annual Technical Conference, FREENIX Track, pp.81-91, 1999. ,
The md5 message-digest algorithm, 1992. ,
DOI : 10.17487/rfc1321
Finding Preimages in Full MD5 Faster Than Exhaustive Search, Advances in Cryptology -EUROCRYPT 2009, pp.134-152, 2009. ,
DOI : 10.1007/11426639_2
Wireless location privacy protection, Computer, vol.36, issue.12, pp.135-137, 2003. ,
DOI : 10.1109/MC.2003.1250896
Finding Collisions in the Full SHA-1, Advances in Cryptology -CRYPTO 2005, pp.17-36, 2005. ,
DOI : 10.1007/11535218_2