메뉴 건너뛰기




Volumn 3677 LNCS, Issue , 2005, Pages 200-209

Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks

Author keywords

Network security; Routing discovery protocol; Sequential aggregate signature

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MULTIMEDIA SYSTEMS; NETWORK PROTOCOLS; ROUTERS; AD HOC NETWORKS; AGGREGATES; NETWORK ROUTING;

EID: 33646136886     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11552055_20     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432.
    • EUROCRYPT 2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 2
    • 4143140890 scopus 로고    scopus 로고
    • A survey of two signature aggregation techniques
    • Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: A Survey of Two Signature Aggregation Techniques. In CryptoBytes Vol. 6, No. 2, 2003.
    • (2003) CryptoBytes , vol.6 , Issue.2
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 5
    • 33646123892 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • special issue on Mobile Ad hoc Networks, summer
    • L. Buttyán and J. P. Hubaux, Stimulating cooperation in self-organizing mobile Ad hoc networks, ACM Journal for Mobile Networks (MONET), special issue on Mobile Ad hoc Networks, summer 2002.
    • (2002) ACM Journal for Mobile Networks (MONET)
    • Buttyán, L.1    Hubaux, J.P.2
  • 6
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Yih-Chun Hu, Adrian Perrig, David B. Johnson: Ariadne: a secure on-demand routing protocol for ad hoc networks. MOBICOM 2002: 12-23
    • MOBICOM 2002 , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • J. Coron: On the Exact Security of Full Domain Hash. CRYPTO 2000: 229-235
    • CRYPTO 2000 , pp. 229-235
    • Coron, J.1
  • 8
    • 0042209739 scopus 로고    scopus 로고
    • A micropayment scheme encouraging collaboration in multi-hop cellular networks
    • La Guadeloupe, January
    • M. Jakobsson, J. P. Hubaux, and L. Buttyan. A micropayment scheme encouraging collaboration in multi-hop cellular networks, in Proceedings of Financial Crypto 2003, La Guadeloupe, January 2003.
    • (2003) Proceedings of Financial Crypto 2003
    • Jakobsson, M.1    Hubaux, J.P.2    Buttyan, L.3
  • 10
    • 2642519677 scopus 로고    scopus 로고
    • Probabilistic multi-signature schemes using a one-way trapdoor permutation
    • K. Kawauchi, Y. Komano, K. Ohta and M. Tada: Probabilistic multi-signature schemes using a one-way trapdoor permutation, IEICE transactions on fundamentals, vol.E87-A, no5, pp.1141-1153, 2004.
    • (2004) IEICE Transactions on Fundamentals , vol.E87-A , Issue.5 , pp. 1141-1153
    • Kawauchi, K.1    Komano, Y.2    Ohta, K.3    Tada, M.4
  • 11
    • 35048877778 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor one-way permutations
    • Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham: Sequential Aggregate Signatures from trapdoor one-way permutations. EUROCRYPT 2004: 74-90.
    • EUROCRYPT 2004 , pp. 74-90
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 12
    • 5044238739 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • P. Michiardi, and R. Molva. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In Proc. of CMS'02.
    • Proc. of CMS'02
    • Michiardi, P.1    Molva, R.2
  • 13
    • 4444276583 scopus 로고    scopus 로고
    • A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile Ad hoc networks
    • P.Michiardi, and R. Molva. A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks. In Proc. of WiOpt03 of the IEEE Computer Society.
    • Proc. of WiOpt03 of the IEEE Computer Society
    • Michiardi, P.1    Molva, R.2
  • 15
    • 84944900444 scopus 로고    scopus 로고
    • Rivest: Micropayments revisited
    • Silvio Micali, Ronald L. Rivest: Micropayments Revisited. CT-RSA 2002: 149-163.
    • CT-RSA 2002 , pp. 149-163
    • Micali, S.1    Ronald, L.2
  • 17
    • 33646153888 scopus 로고    scopus 로고
    • Constructing sequential aggregate signatures for secure wireless routing protocols
    • New Orleans, 13-17 March, New Orleans, LA, USA
    • Huafei Zhu et al, Constructing Sequential Aggregate Signatures for Secure Wireless Routing Protocols, IEEE WCNC'05, New Orleans, 13-17 March, 2005, New Orleans, LA, USA.
    • (2005) IEEE WCNC'05
    • Zhu, H.1
  • 18
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • San Francisco, CA, April
    • Sheng Zhong, Jiang Chen, and Yang Richard Yang. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad hoc Networks.Proceedings of IEEE INFOCOM '03, San Francisco, CA, April 2003.
    • (2003) Proceedings of IEEE INFOCOM '03
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.