-
1
-
-
0035001320
-
Exploring robustness in group key agreement
-
April
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, and G. Tsudik. Exploring robustness in group key agreement. In IEEE International Conference on Distributed Computing Systems, pages 399-408, April 2001.
-
(2001)
IEEE International Conference on Distributed Computing Systems
, pp. 399-408
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.4
Stanton, J.5
Tsudik, G.6
-
3
-
-
35248880074
-
Efficient threshold signatures, multisignatures and blind signatures based on the gap-diffi e-hellman-group signature scheme
-
Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
-
A. Boldyreva. Efficient threshold signatures, multisignatures and blind signatures based on the gap-diffi e-hellman-group signature scheme. In Proceedings of International Workshop on Practice and Theory in Public Key Cryptography, volume 2567 of LNCS, pages 31-46, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
4
-
-
84958639277
-
Efficient generation of shared RSA keys
-
B. Kaliski, editor, number 1294 in LNCS. IACR
-
D. Boneh and M. Franklin. Efficient Generation of Shared RSA keys. In B. Kaliski, editor, CRYPTO '97, number 1294 in LNCS, pages 425-439. IACR, 1997.
-
(1997)
CRYPTO '97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84946840347
-
Short signatures from the weil pairing
-
C. Boyd, editor, number 2248 in LNCS. IACR
-
D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. In C. Boyd, editor, ASIACRYPT'01, number 2248 in LNCS, pages 514-532. IACR, 2001.
-
(2001)
ASIACRYPT'01
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
University of Massachusetts, August
-
B. Dahill, B. Levine, E. Royer, and C. Shields. A secure routing protocol for ad hoc networks. Technical Report UM-CS-2001-037, University of Massachusetts, August 2001.
-
(2001)
Technical Report
, vol.UM-CS-2001-037
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
7
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, editor, number 435 in LNCS. IACR
-
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, CRYPTO '89, number 435 in LNCS, pages 307-315. IACR, 1990.
-
(1990)
CRYPTO '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
84958676203
-
Proactive RSA
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Proactive RSA. In Proc. of Crypto'97, pages 440-454, 1997.
-
(1997)
Proc. of Crypto'97
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
11
-
-
84947926543
-
Robust threshold DSS signatures
-
U. Maurer, editor, number 1070 in LNCS. IACR
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust Threshold DSS Signatures. In U. Maurer, editor, EUROCRYPT '96, number 1070 in LNCS, pages 354-371. IACR, 1996.
-
(1996)
EUROCRYPT '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
IETF, Apr.
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, IETF, Apr. 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
19
-
-
0345755816
-
Adaptive security for multi-level ad-hoc networks
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu. Adaptive Security for Multi-level Ad-hoc Networks. In Journal of Wireless Communications and Mobile Computing (WCMC), volume 2, pages 533-547, 2002.
-
(2002)
Journal of Wireless Communications and Mobile Computing (WCMC)
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
20
-
-
0012845612
-
Providing robust and ubiquitous security support for MANET
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for MANET. In IEEE 9th International Conference on Network Protocols (ICNP), 2001.
-
(2001)
IEEE 9th International Conference on Network Protocols (ICNP)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
21
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
to appear, Oct
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang. URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, available on-line at http://www.cs.ucla.edu/wing/publication/publication.html. In IEEE/ACM Transactions on Networking (ToN), to appear, Oct 2004.
-
(2004)
IEEE/ACM Transactions on Networking (ToN)
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
22
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
Dept. of Computer Science, UCLA
-
H. Luo and S. Lu. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks, available on-line at http://citeseer.ist.psu.edu/ luo00ubiquitous.html. Technical Report TR-200030, Dept. of Computer Science, UCLA, 2000.
-
(2000)
Technical Report
, vol.TR-200030
-
-
Luo, H.1
Lu, S.2
-
23
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-securing Ad Hoc Wireless Networks. In Seventh IEEE Symposium on Computers and Communications (ISCC '02), 2002.
-
(2002)
Seventh IEEE Symposium on Computers and Communications (ISCC '02)
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
24
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control
-
November
-
M. Narasimha, G. Tsudik, and J. H. Yi. On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. In IEEE International Conference on Network Protocol (ICNP), pages 336-345, November 2003.
-
(2003)
IEEE International Conference on Network Protocol (ICNP)
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
26
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
D. Davies, editor, number 547 in LNCS. IACR
-
T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. Davies, editor, EUROCRYPT '91, number 547 in LNCS, pages 552-526. IACR, 1991.
-
(1991)
EUROCRYPT '91
, pp. 552-1526
-
-
Pedersen, T.P.1
-
27
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. Spins: Security protocols for sensor networks. In Mobile Computing and Networking, 2001.
-
(2001)
Mobile Computing and Networking
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
28
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
H. Krawczyk, editor, number 1462 in LNCS. IACR
-
T. Rabin. A Simplified Approach to Threshold and Proactive RSA. In H. Krawczyk, editor, CRYPTO '98, number 1462 in LNCS, pages 89-104. IACR, 1998.
-
(1998)
CRYPTO '98
, pp. 89-104
-
-
Rabin, T.1
-
31
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
84948954277
-
Practical threshold signatures
-
B. Preneel, editor, number 1807 in LNCS. IACR
-
V. Shoup. Practical Threshold Signatures. In B. Preneel, editor, EUROCRYPT '00, number 1807 in LNCS, pages 207-220. IACR, 2000.
-
(2000)
EUROCRYPT '00
, pp. 207-220
-
-
Shoup, V.1
-
35
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
36
-
-
0345757359
-
Coca: A secure distributed on-line certifi cation authority
-
November
-
L. Zhou, F. Schneider, and R. van Renesse. Coca: A secure distributed on-line certifi cation authority. ACM Transactions on Computer Systems, 20(4):329-368, November 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.2
Van Renesse, R.3
|