-
1
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
July
-
Yih-Chun Hu, Johnson David B., Perrig Adrian, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad Hoc Networks Volume. 1, Issue 1, July, 2003, pp. 175-192.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
2
-
-
13244276488
-
Secure routing in mobile wireless ad hoc networks
-
July
-
Gupte Siddhartha, Singhal Mukesh, Secure routing in mobile wireless ad hoc networks, Ad Hoc Networks Volume. 1, Issue 1, July, 2003, pp. 151-174.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 151-174
-
-
Siddhartha, G.1
Mukesh, S.2
-
3
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer., A secure routing protocol for ad hoc networks, In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), 2002, pp. 78-89.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
5
-
-
20544465052
-
Anonymous Secure Routing in Mobile Ad-Hoc Networks
-
Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng, Anonymous Secure Routing in Mobile Ad-Hoc Networks, Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), pp. 102-108.
-
Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04)
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
6
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
March 4
-
Choie Young Ju, Jeong Eunkyung, Lee Eunjeong, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation Volume.162, Issue 1, March 4, 2005, pp. 179-188.
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
7
-
-
2042471479
-
On the security of an efficient two-pass key agreement protocol
-
August
-
Tseng Yuh-Min, On the security of an efficient two-pass key agreement protocol, Computer Standards and Interfaces, Volume.26, Issue: 4, August, 2004, pp. 371-374.
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.4
, pp. 371-374
-
-
Tseng, Y.M.1
-
8
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Young Ju Choie, Eunkyung Jeong, Eunjeong Lee, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation 162, 2005, pp. 179-188.
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
9
-
-
33744535150
-
Towards Security Two-part Authenticated Key Agreement Protocols
-
Report 2005/300
-
Songping Li, Quan Yuan, Jin Li, Towards Security Two-part Authenticated Key Agreement Protocols, Cryptology ePrint Archive, Report 2005/300, http://eprint.iacr.org, 2005.
-
(2005)
Cryptology EPrint Archive
-
-
Li, S.1
Yuan, Q.2
Li, J.3
-
10
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
LNCS 2139
-
Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001, pp. 213-229.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, pp. 213-229
-
-
Franklin, B.M.1
-
11
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
Muhammad Bohio, Ali Miri, Efficient identity-based security schemes for ad hoc network routing protocols, Ad Hoc Networks 2, 2004, pp. 309-317.
-
(2004)
Ad Hoc Networks
, vol.2
, pp. 309-317
-
-
Bohio, M.1
Miri, A.2
-
12
-
-
33744495128
-
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
-
March 25-30
-
Chu-Hsing Lin, and Hsiu-Hsia Lin, Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing, Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2005), Vol.2, March 25-30, 2005, pp. 135-138.
-
(2005)
Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2005)
, vol.2
, pp. 135-138
-
-
Lin, C.-H.1
Lin, H.-H.2
-
13
-
-
33744523283
-
Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing
-
Taipei, Taiwan, June 10-11
-
Chu-Hsing Lin, K. J. Huang and H. H. Lin, Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing, Proceedings of 14th Information Security Conference, Taipei, Taiwan, June 10-11, 2004, pp. 250-255.
-
(2004)
Proceedings of 14th Information Security Conference
, pp. 250-255
-
-
Lin, C.-H.1
Huang, K.J.2
Lin, H.H.3
-
14
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks
-
Internet-Draft Version 03, IETF, October
-
J. Broch, David B. Johnson, and David A. Maltz, The dynamic source routing protocol for mobile ad hoc networks, Internet-Draft Version 03, IETF, October 1999.
-
(1999)
-
-
Broch, J.1
Johnson, D.B.2
Maltz, D.A.3
-
15
-
-
85031307530
-
Highly Dynamic Destination-Sequenced Distance-Vector Routing(DSDV) for Mobile Computers
-
Charles E. Perkins, Pravin Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing(DSDV) for Mobile Computers, In Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, 1994, pp. 234-244.
-
(1994)
Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkin, C.E.1
Bhagwat, P.2
-
17
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Y. J. Choie, E. Jeong and E. Lee, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation, vol. 162(1), pp. 179-188.
-
Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
18
-
-
33744550865
-
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
-
Report 2005/357
-
Kyung-Ah Shim, Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive, Report 2005/357, http://eprint.iacr.org, 2005.
-
(2005)
Cryptology EPrint Archive
-
-
Shim, K.-A.1
|