메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 362-379

Identity-based access control for ad hoc groups

Author keywords

Access control; Ad hoc group security; Threshold signatures

Indexed keywords

COMPUTATION THEORY; COMPUTER SCIENCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; PROBLEM SOLVING; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 24944583077     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_27     Document Type: Conference Paper
Times cited : (32)

References (34)
  • 6
    • 24944471622 scopus 로고    scopus 로고
    • Playing in the dark: The heat is on, and music swappers are taking their business underground
    • Hamilton, A.: Playing in the dark: The heat is on, and music swappers are taking their business underground. TIME Magazine (2003)
    • (2003) TIME Magazine
    • Hamilton, A.1
  • 14
    • 84947926543 scopus 로고    scopus 로고
    • Robust threshold DSS signatures
    • Maurer, U., ed.: EUROCRYPT'96, IACR
    • Gennaro, R., S.Jarecki, H.Krawczyk, T.Rabin: Robust Threshold DSS Signatures. In Maurer, U., ed.: EUROCRYPT'96. Number 1070 in LNCS, IACR (1996) 354-371
    • (1996) LNCS , vol.1070 , pp. 354-371
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 15
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Brassard, G., ed.: CRYPTO '89, IACR
    • Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In Brassard, G., ed.: CRYPTO '89. Number 435 in LNCS, IACR (1990) 307-315
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 17
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • to appear
    • Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, available online at http://www.cs.ucla.edu/wing/publication/publication.html. In: IEEE/ACM Transactions on Networking (ToN), to appear. (2004)
    • (2004) IEEE/ACM Transactions on Networking (ToN)
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 19
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of RSA functions
    • Koblitz, N., ed.: CRYPTO'96, IACR
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and Efficient Sharing of RSA Functions. In Koblitz, N., ed.: CRYPTO'96. Number 1109 in LNCS, IACR (1996) 157-172
    • (1996) LNCS , vol.1109 , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 21
    • 35248880074 scopus 로고    scopus 로고
    • Efficient threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme
    • Proceedings of International Workshop on Practice and Theory in Public Key Cryptography.
    • Boldyreva, A.: Efficient threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Proceedings of International Workshop on Practice and Theory in Public Key Cryptography. Volume 2567 of LNCS. (2003) 31-46
    • (2003) LNCS , vol.2567 , pp. 31-46
    • Boldyreva, A.1
  • 22
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boyd, C., ed.: ASIACRYPT'01, IACR
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In Boyd, C., ed.: ASIACRYPT'01. Number 2248 in LNCS, IACR (2001) 514-532
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 24
    • 0001273778 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log based Cryptosystems. In: Eurocrypt 99. (1999)
    • (1999) Eurocrypt 99
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 27
    • 35248844436 scopus 로고    scopus 로고
    • An ID-based signature from Gap-Diffie-Hellman Groups
    • Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
    • Cha, J., Cheon, J.: An ID-based signature from Gap-Diffie-Hellman Groups. In: Proceedings of International Workshop on Practice and Theory in Public Key Cryptography. Volume 2567 of LNCS. (2003) 18-30
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 28
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Proceedings of International Conference on Financial Cryptography
    • Kocher, P.C.: On Certificate Revocation and Validation. In: Proceedings of International Conference on Financial Cryptography. Volume 1465 of LNCS. (1998)
    • (1998) LNCS , vol.1465
    • Kocher, P.C.1
  • 30
    • 24944586621 scopus 로고    scopus 로고
    • OpenSSL Project: (http://www.openssl.org/)
  • 31
    • 24944527690 scopus 로고    scopus 로고
    • MIRACL Library: (http://indigo.ie/~mscott/)
  • 33
    • 24944587415 scopus 로고    scopus 로고
    • OLSR: (http://hipercom.inria.fr/olsr/)
  • 34
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Yung, M., ed.: CRYPTO'02, IACR
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-based Cryptosystems. In Yung, M., ed.: CRYPTO'02. Number 2442 in LNCS, IACR (2002) 354-369
    • (2002) LNCS , vol.2442 , pp. 354-369
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.