메뉴 건너뛰기




Volumn E88-B, Issue 6, 2005, Pages 2548-2556

ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile Ad-hoc networks

Author keywords

Ad hoc networks; Identity based signcryption; Secure routing

Indexed keywords

BANDWIDTH; COMPUTATIONAL METHODS; COMPUTER SIMULATION; MOBILE TELECOMMUNICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 25844478002     PISSN: 09168516     EISSN: 17451345     Source Type: Journal    
DOI: 10.1093/ietcom/e88-b.6.2548     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 1
    • 84943807207 scopus 로고    scopus 로고
    • Toward secure key distribution in truly ad-hoc networs
    • A. Khalili, J. Katz, and W.A. Arbaugh, "Toward secure key distribution in truly ad-hoc networs," SAINT-w'03, 2003.
    • (2003) SAINT-w'03
    • Khalili, A.1    Katz, J.2    Arbaugh, W.A.3
  • 4
    • 0027629456 scopus 로고
    • Development of WaveLAN, and ISM band wireless LAN
    • July/Aug.
    • B. Tuch, "Development of WaveLAN, and ISM band wireless LAN," AT&T Tech. J., vol.72, no.4, pp.27-33, July/Aug. 1993.
    • (1993) AT&T Tech. J. , vol.72 , Issue.4 , pp. 27-33
    • Tuch, B.1
  • 5
    • 0003855464 scopus 로고    scopus 로고
    • Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley
    • B. Schneier, Applied Cryptography, Second edition, Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley, 1996.
    • (1996) Applied Cryptography, Second Edition
    • Schneier, B.1
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Advances in Cryptology-Crypto'01, Springer
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Advances in Cryptology-Crypto'01, LNCS 2193, Springer, 2001.
    • (2001) LNCS , vol.2193
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0012994607 scopus 로고    scopus 로고
    • Performance of elliptic curve cryptosystems
    • J. Lopez and R. Dahab, "Performance of elliptic curve cryptosystems," Technical Report IC-00-08, 2000., http://www.dcc.unicamp. br/ic-main/publications-e.html
    • (2000) Technical Report , vol.IC-00-08
    • Lopez, J.1    Dahab, R.2
  • 11
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov.
    • L. Zhou and Z.J. Hass, "Securing ad hoc networks," IEEE Network Magazine, vol.13, no.6, pp.24-30, Nov. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Hass, Z.J.2
  • 12
    • 0037842963 scopus 로고    scopus 로고
    • Strategies for enhancing routing security in protocols for mobile ad hoc networks
    • Feb.
    • L. Venkatraman and D.P. Agrawal, "Strategies for enhancing routing security in protocols for mobile ad hoc networks," J. Parallel Distrib. Comput., vol.63, no.2, pp.214-227, Feb. 2003.
    • (2003) J. Parallel Distrib. Comput. , vol.63 , Issue.2 , pp. 214-227
    • Venkatraman, L.1    Agrawal, D.P.2
  • 13
    • 0004215976 scopus 로고
    • A logic of authentication, digital system research center
    • Feb.
    • M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, Digital System Research Center, Technical Report 39, Feb. 1990.
    • (1990) Technical Report , vol.39
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 15
    • 0013138682 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • San Antonio, TX, Jan.
    • P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," Proc. CNDS 2002, San Antonio, TX, Jan. 2002.
    • (2002) Proc. CNDS 2002
    • Papadimitratos, P.1    Haas, Z.2
  • 16
    • 0033892676 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • S.R. Das, C.E. Perkins, and E.M. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," INFOCOM'2000, 2000.
    • (2000) INFOCOM'2000
    • Das, S.R.1    Perkins, C.E.2    Royer, E.M.3
  • 17
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure ondemand routing protocol for ad hoc networks
    • Y.C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A secure ondemand routing protocol for ad hoc networks," Proc. MOBICOM 2002, 2002.
    • (2002) Proc. MOBICOM 2002
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 18
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)
    • Advances in Cryptology-Crypto'97, , Springer
    • Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)," Advances in Cryptology-Crypto'97, LNCS 1294, pp. 165-179, Springer, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.