메뉴 건너뛰기




Volumn 60, Issue 4, 2004, Pages 2735-2738

Hierarchical key management for mobile ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 17144428539     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (9)
  • 4
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov.
    • A. Shamir. How to share a secret. Commun. of the ACM. 22:612-613, Nov. 1979.
    • (1979) Commun. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 5
    • 0001000209 scopus 로고    scopus 로고
    • Practical threshold signatures
    • May
    • V. Shoup. Practical threshold signatures. Proc. Eurocrypt 2000, pages 207-221, May 2000.
    • (2000) Proc. Eurocrypt 2000 , pp. 207-221
    • Shoup, V.1
  • 6
    • 84904907052 scopus 로고    scopus 로고
    • Key management for heterogeneous ad hoc wireless networks
    • Nov.
    • S. Yi and R. Kravets. Key management for heterogeneous ad hoc wireless networks. Proc. IEEE Int. Conf. on Network Protocols, pages 202-203, Nov. 2002.
    • (2002) Proc. IEEE Int. Conf. on Network Protocols , pp. 202-203
    • Yi, S.1    Kravets, R.2
  • 7
    • 3042629977 scopus 로고    scopus 로고
    • Key management for heterogeneous ad-hoc wireless networks
    • Dept. of Computer Science, University of Illinois at Urbana-Champaign, July
    • S. Yi and R. Kravets. Key management for heterogeneous ad-hoc wireless networks. Technical report, Dept. of Computer Science, University of Illinois at Urbana-Champaign, July 2002.
    • (2002) Technical Report
    • Yi, S.1    Kravets, R.2
  • 8
    • 17144398990 scopus 로고    scopus 로고
    • MOCA: Mobile certificate authority for wireless ad-hoc networks
    • Apr.
    • S. Yi and R. Kravets. MOCA: Mobile Certificate Authority for Wireless Ad-Hoc Networks. Proc. PKI Research Workshop, pages 65-79, Apr. 2003.
    • (2003) Proc. PKI Research Workshop , pp. 65-79
    • Yi, S.1    Kravets, R.2
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network Magazine. 13:24-30, Nov./Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.