메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 53-62

Improved topology assumptions for threshold cryptography in mobile ad hoc networks

Author keywords

Distributed Cryptography; Mobile Ad Hoc Networks; Threshold Cryptography; Threshold Signatures

Indexed keywords

DISTRIBUTED CRYPTOGRAPHY; MOBILE AD HOC NETWORKS; THRESHOLD CRYPTOGRAPHY; THRESHOLD SIGNATURES;

EID: 33144477455     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102219.1102228     Document Type: Conference Paper
Times cited : (11)

References (20)
  • 1
    • 33745942082 scopus 로고    scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • D. Beaver and S. Haber, Cryptographic Protocols Provably Secure Against Dynamic Adversaries, in Proc. of Eurocrypt 1992.
    • Proc. of Eurocrypt 1992
    • Beaver, D.1    Haber, S.2
  • 2
    • 3042802118 scopus 로고    scopus 로고
    • The node distribution of the random waypoint mobility model for wireless ad hoc networks
    • Jul.-Sept.
    • C. Bettstetter, G. Resta, and P. Santi, The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks, IEEE Trans.Mobile Computing, vol. 2, pp. 257-269, Jul.-Sept. 2003.
    • (2003) IEEE Trans.Mobile Computing , vol.2 , pp. 257-269
    • Bettstetter, C.1    Resta, G.2    Santi, P.3
  • 3
    • 0842326315 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in MANETs
    • Institute for Systems Research, May
    • R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, Bootstrapping Security Associations for Routing in MANETs, in Institute for Systems Research, ISR Technical Report 2002-44, May 2002
    • (2002) ISR Technical Report , vol.2002 , Issue.44
    • Bobba, R.B.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 11
    • 0000613666 scopus 로고    scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman, A Practical Scheme for Non-Interactive Verifiable Secret Sharing, in Proc. of FOCS 87.
    • Proc. of FOCS 87
    • Feldman, P.1
  • 15
    • 1642324009 scopus 로고    scopus 로고
    • Statistically Unique and Cryptographically Verifiable (SUCV) identifier and addresses
    • G. Montenegro and C. Castelluccia, Statistically Unique and Cryptographically Verifiable (SUCV) Identifier and Addresses, in Proc. of NDSS 2002.
    • Proc. of NDSS 2002
    • Montenegro, G.1    Castelluccia, C.2
  • 18
    • 0000135789 scopus 로고    scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. Pedersen, A Threshold Cryptosystem without a Trusted Party, in Proc. of Eurocrypt 91.
    • Proc. of Eurocrypt 91
    • Pedersen, T.1
  • 19
    • 33745962213 scopus 로고    scopus 로고
    • Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem
    • R. Zhang and H. Imai. Round Optimal Distributed Key Generation of Threshold Cryptosystem based on Discrete Logarithm Problem, in Proc. of ACNS 2003.
    • Proc. of ACNS 2003
    • Zhang, R.1    Imai, H.2
  • 20
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing Ad Hoc Networks, in IEEE Network Magazine, vol. 13, no.6, 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.