메뉴 건너뛰기




Volumn 16, Issue 5, 2005, Pages 411-425

On digital signatures in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; DISTRIBUTED SYSTEMS; SECURITY LEVEL; TRAFIFIC FLOW;

EID: 26844467743     PISSN: 1124318X     EISSN: None     Source Type: Journal    
DOI: 10.1002/ett.1061     Document Type: Article
Times cited : (15)

References (40)
  • 6
    • 84888912224 scopus 로고    scopus 로고
    • secg - standards for efficient cryptography group
    • Certicom Webside http://www.secg.org/, secg - standards for efficient cryptography group.
    • Certicom Webside
  • 9
    • 0242510134 scopus 로고    scopus 로고
    • Voice over Internet Protocol (VoIP)
    • Goode B. Voice over Internet Protocol (VoIP). In Proceedings of the IEEE 2002; 90:1495-1517.
    • (2002) Proceedings of the IEEE , vol.90 , pp. 1495-1517
    • Goode, B.1
  • 11
    • 84888906383 scopus 로고    scopus 로고
    • IEEE P1363 standard
    • I.P. Group. IEEE P1363 standard, available at http://grouper.ieee.org/ groups/1363/index.html.
  • 19
    • 0033890503 scopus 로고    scopus 로고
    • Multihop cellular: A new architecture for wireless communication
    • Tel Aviv, Israel, March
    • Lin YD, Hsu Y. Multihop cellular: A new architecture for wireless communication. Proceedings of IEEE INFOCOM '00, Tel Aviv, Israel, March 2000.
    • (2000) Proceedings of IEEE INFOCOM '00
    • Lin, Y.D.1    Hsu, Y.2
  • 20
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • LNCS 839, Springer-Verlag
    • Lim CH, Lee PJ. More flexible exponentiation with precomputation. Advances in Cryptography-Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 95-107.
    • (1994) Advances in Cryptography-crypto'94 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 22
    • 84968484435 scopus 로고
    • Speeding up the pollard and elliptic curve methods of factorisation
    • Montgomery P. Speeding up the pollard and elliptic curve methods of factorisation. Mathematics of Computation 1987; 48: 243-264.
    • (1987) Mathematics of Computation , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 23
    • 26644463857 scopus 로고    scopus 로고
    • The Network Simulator NS-2, Available: http://www.ietf.org/html.charters/ manet-charter.html.
    • The Network Simulator NS-2
  • 24
    • 84888914889 scopus 로고    scopus 로고
    • The openssl project, 1998-2000, Available: http://www.openssl.org.
    • (1998) The Openssl Project
  • 25
    • 0036969459 scopus 로고    scopus 로고
    • Context aware detection of selfish node in DSR based ad-hoc networks
    • Taipei, Taiwan, November
    • Paul K, Westhoff D. Context Aware Detection of Selfish Node in DSR Based Ad-hoc Networks. Proceedings of IEEE GLOBECOM '02, Taipei, Taiwan, November 2002.
    • (2002) Proceedings of IEEE GLOBECOM '02
    • Paul, K.1    Westhoff, D.2
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 1978; 21(2):120-126.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 31
    • 84888893522 scopus 로고    scopus 로고
    • RSA Laboratories, Factoring Challenge, Available: http://www.rsa- security.com/resources/ecc_chall/challenge.html.
    • Factoring Challenge
  • 32
    • 84888904701 scopus 로고    scopus 로고
    • Jan.
    • RSA Data Security. DES Challenge III, Jan. 1999, Available: http://www.rsasecurity.com/rsalabs/challenges/des3/.
    • (1999) DES Challenge III
  • 33
    • 35048826202 scopus 로고    scopus 로고
    • Zero common knowledge authentication for pervasive networks
    • LNCS 3006, Springer-Verlag, Ottawa, Ontario, Canada, August
    • Weimerskirch A, Westhoff D. Zero Common Knowledge Authentication for Pervasive Networks. Selected Areas in Cryptography (SAC03), LNCS 3006, Springer-Verlag, Ottawa, Ontario, Canada, August 2003.
    • (2003) Selected Areas in Cryptography (SAC03)
    • Weimerskirch, A.1    Westhoff, D.2
  • 35
    • 24144439871 scopus 로고    scopus 로고
    • Efficient pairwise authentication protocols for sensor networks: Theory and performance analysis
    • Carruth J, La Porta TF (eds). IEEE Press: USA, September
    • Weimerskirch A, Westhoff D, Lucks S, Zenner E. Efficient pairwise authentication protocols for sensor networks: theory and performance analysis. IEEE Press: Sensor Network Operations, Carruth J, La Porta TF (eds). IEEE Press: USA, September 2004.
    • (2004) IEEE Press: Sensor Network Operations
    • Weimerskirch, A.1    Westhoff, D.2    Lucks, S.3    Zenner, E.4
  • 37
    • 0032313105 scopus 로고    scopus 로고
    • Digital signatures for flow and multicasts
    • Austin, TX, October
    • Wong CK, Lam S. Digital signatures for flow and multicasts. Proceedings of IEEE ICNP'98, Austin, TX, October 1998.
    • (1998) Proceedings of IEEE ICNP'98
    • Wong, C.K.1    Lam, S.2
  • 38
    • 4544221255 scopus 로고    scopus 로고
    • Secure Ad hoc On-Demand Distance Vector (SAODV) routing
    • draft-guerrero-manet-saodv-00.txt, August
    • Zapata MG. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001.
    • (2001) Internet Draft
    • Zapata, M.G.1
  • 39
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, USA, March
    • Zhong S, Yang YR, Chen J. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. Proceedings of IEEE INFOCOM '03, San Francisco, USA, March 2003.
    • (2003) Proceedings of IEEE INFOCOM '03
    • Zhong, S.1    Yang, Y.R.2    Chen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.