메뉴 건너뛰기




Volumn , Issue , 2005, Pages 57-64

An efficient group key establishment in location-aided mobile Ad hoc networks

Author keywords

Group key management; Key tree; Maximum matching

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; INFORMATION THEORY; MOBILE RADIO SYSTEMS; SECURITY SYSTEMS; TOPOLOGY;

EID: 31844456886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089803.1089967     Document Type: Conference Paper
Times cited : (3)

References (41)
  • 2
    • 33645444633 scopus 로고    scopus 로고
    • Tripartite authenticated key agreement protocols from pairings
    • Report 2002/035
    • Al-Riyami, S. and Paterson, K. G. Tripartite Authenticated key Agreement Protocols from Pairings. Cryptology ePrint Archieve, Report 2002/035, http:/eprint.iacr.org/2002/035.
    • Cryptology EPrint Archieve
    • Al-Riyami, S.1    Paterson, K.G.2
  • 5
    • 0034317075 scopus 로고    scopus 로고
    • Key Agreement in ad hoc networks
    • Nov.
    • Asokan, N. and Ginzboorg, P. Key Agreement in ad hoc networks. Computer Communications, 23, 17, (Nov. 2000), 1627-1637.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M. Identity-Based Encryption from the Weil Pairing. In proceedings of Crypt '01, 213-229.
    • Proceedings of Crypt '01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 84948991087 scopus 로고    scopus 로고
    • A secure and efficient conference key distribution system
    • Berlin, Springer
    • Burmester, M. and Desmedt, Y. A secure and efficient conference key distribution system. Advances in Cryptology-EUROCRYPT '94, LNCS 950, Berlin, 275-286, Springer.
    • Advances in Cryptology-EUROCRYPT '94, LNCS , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 13
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for secure multicast
    • Sept.-Oct.
    • Chan, K. and S.-H. G. Key management approaches to offer data confidentiality for secure multicast. IEEE Network, 17, 5, (Sept.-Oct. 2003), 30 - 39.
    • (2003) IEEE Network , vol.17 , Issue.5 , pp. 30-39
    • Chan, K.1    G., S.-H.2
  • 19
    • 0016943409 scopus 로고
    • An efficient implementation of Edmonds' algorithm for maximum matching on graphs
    • April
    • Gabow, Harold N. An efficient implementation of Edmonds' algorithm for maximum matching on graphs. Journal of the ACM, 23, 2, (April 1976), 221-234.
    • (1976) Journal of the ACM , vol.23 , Issue.2 , pp. 221-234
    • Gabow, H.N.1
  • 20
    • 0022675147 scopus 로고
    • Efficient algorithms for finding maximum matching in graphs
    • March
    • Galil, Z. Efficient algorithms for finding maximum matching in graphs. ACM Computing Surveys (CSUR), 18, 1, (March 1986), 23-38.
    • (1986) ACM Computing Surveys (CSUR) , vol.18 , Issue.1 , pp. 23-38
    • Galil, Z.1
  • 26
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite diffie-hellman
    • Springer-Verlag
    • Joux, A. A one Round Protocol for Tripartite Diffie-Hellman. ANTS IV, (LNCS 1838, Springer-Verlag, 2000), 385-394.
    • (2000) ANTS IV, LNCS 1838 , pp. 385-394
    • Joux, A.1
  • 30
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N. Elliptic curve cryptosystems. Mathematics of Computation, 48, (1987), 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 31
    • 35248848913 scopus 로고    scopus 로고
    • Multi-party authenticated key agreement protocols from multilinear forms
    • Report 2002/166
    • Lee, H. K., Lee, H.-S. and Lee, Y-R. Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms. Cryptology ePrint Archive: Report 2002/166
    • Cryptology ePrint Archive
    • Lee, H.K.1    Lee, H.-S.2    Lee, Y.-R.3
  • 33
    • 85015402934 scopus 로고    scopus 로고
    • Uses of elliptic curves in cryptography
    • (LNCS 218), New York, Springer-Verlag
    • Miller, V. Uses of elliptic curves in cryptography. In proceedings of Advanced in Cryptology (crypto '85), (LNCS 218), New York, Springer-Verlag, 417-426.
    • Proceedings of Advanced in Cryptology (Crypto '85) , pp. 417-426
    • Miller, V.1
  • 34
    • 1342323825 scopus 로고    scopus 로고
    • Group communications in mobile Ad hoc networks
    • Feb.
    • Mohapatra, P., Cui, C. and Li, J. Group Communications in Mobile Ad Hoc Networks. IEEE Computer Society, (Feb. 2004), 52-59.
    • (2004) IEEE Computer Society , pp. 52-59
    • Mohapatra, P.1    Cui, C.2    Li, J.3
  • 38
    • 0033748607 scopus 로고    scopus 로고
    • New multi-party authentication services and key agreement protocols
    • Special Issue on Network Security, April
    • Steiner, M., Ateniese, G., and Tsudik, G. New Multi-party Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Area in Communications (JSAC), Special Issue on Network Security, 18, 4, (April 2000), 628-639.
    • (2000) IEEE Journal of Selected Area in Communications (JSAC) , vol.18 , Issue.4 , pp. 628-639
    • Steiner, M.1    Ateniese, G.2    Tsudik, G.3
  • 40
    • 23044522039 scopus 로고    scopus 로고
    • Round-efficient conference-key agreement protocols with provable security
    • December
    • Tzeng, W.-G. and Tzeng, Z.-J. Round-efficient conference-key agreement protocols with provable security. In advances in Cryptology (ASIACRYPT'00), December 2000.
    • (2000) Advances in Cryptology (ASIACRYPT'00)
    • Tzeng, W.-G.1    Tzeng, Z.-J.2
  • 41
    • 84900423668 scopus 로고    scopus 로고
    • [Online]
    • The Secure Multicast Research Group (SMuG), Internet Research Task Force (IRTF). [Online]. Available at: http://www.securemulticast.org/
    • Internet Research Task Force (IRTF)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.