메뉴 건너뛰기




Volumn 5, Issue 6, 2006, Pages 1214-1221

An identity-based scheme for ad hoc network secure routing protocol from pairing

Author keywords

Key agreement; Key compromise impersonation attack; Secure routing; Weil paring

Indexed keywords

CRYPTOGRAPHY; NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA; VECTORS;

EID: 33744508594     PISSN: 11092750     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (18)
  • 1
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • July
    • Yih-Chun Hu, Johnson David B., Perrig Adrian, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, Ad Hoc Networks Volume. 1, Issue 1, July, 2003, pp. 175-192.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 2
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • July
    • Gupte Siddhartha, Singhal Mukesh, Secure routing in mobile wireless ad hoc networks, Ad Hoc Networks Volume. 1, Issue 1, July, 2003, pp. 151-174.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 151-174
    • Siddhartha, G.1    Mukesh, S.2
  • 6
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • March 4
    • Choie Young Ju, Jeong Eunkyung, Lee Eunjeong, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation Volume.162, Issue 1, March 4, 2005, pp. 179-188.
    • (2005) Applied Mathematics and Computation , vol.162 , Issue.1 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 7
    • 2042471479 scopus 로고    scopus 로고
    • On the security of an efficient two-pass key agreement protocol
    • August
    • Tseng Yuh-Min, On the security of an efficient two-pass key agreement protocol, Computer Standards and Interfaces, Volume.26, Issue: 4, August, 2004, pp. 371-374.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.4 , pp. 371-374
    • Tseng, Y.M.1
  • 8
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Young Ju Choie, Eunkyung Jeong, Eunjeong Lee, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation 162, 2005, pp. 179-188.
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 9
    • 33744535150 scopus 로고    scopus 로고
    • Towards Security Two-part Authenticated Key Agreement Protocols
    • Report 2005/300
    • Songping Li, Quan Yuan, Jin Li, Towards Security Two-part Authenticated Key Agreement Protocols, Cryptology ePrint Archive, Report 2005/300, http://eprint.iacr.org, 2005.
    • (2005) Cryptology EPrint Archive
    • Li, S.1    Yuan, Q.2    Li, J.3
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • LNCS 2139
    • Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001, pp. 213-229.
    • (2001) Advances in Cryptology-CRYPTO 2001 , pp. 213-229
    • Franklin, B.M.1
  • 11
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • Muhammad Bohio, Ali Miri, Efficient identity-based security schemes for ad hoc network routing protocols, Ad Hoc Networks 2, 2004, pp. 309-317.
    • (2004) Ad Hoc Networks , vol.2 , pp. 309-317
    • Bohio, M.1    Miri, A.2
  • 13
    • 33744523283 scopus 로고    scopus 로고
    • Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing
    • Taipei, Taiwan, June 10-11
    • Chu-Hsing Lin, K. J. Huang and H. H. Lin, Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing, Proceedings of 14th Information Security Conference, Taipei, Taiwan, June 10-11, 2004, pp. 250-255.
    • (2004) Proceedings of 14th Information Security Conference , pp. 250-255
    • Lin, C.-H.1    Huang, K.J.2    Lin, H.H.3
  • 14
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks
    • Internet-Draft Version 03, IETF, October
    • J. Broch, David B. Johnson, and David A. Maltz, The dynamic source routing protocol for mobile ad hoc networks, Internet-Draft Version 03, IETF, October 1999.
    • (1999)
    • Broch, J.1    Johnson, D.B.2    Maltz, D.A.3
  • 17
    • 10444220191 scopus 로고    scopus 로고
    • Efficient identity-based authenticated key agreement protocol from pairings
    • Y. J. Choie, E. Jeong and E. Lee, Efficient identity-based authenticated key agreement protocol from pairings, Applied Mathematics and Computation, vol. 162(1), pp. 179-188.
    • Applied Mathematics and Computation , vol.162 , Issue.1 , pp. 179-188
    • Choie, Y.J.1    Jeong, E.2    Lee, E.3
  • 18
    • 33744550865 scopus 로고    scopus 로고
    • Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
    • Report 2005/357
    • Kyung-Ah Shim, Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive, Report 2005/357, http://eprint.iacr.org, 2005.
    • (2005) Cryptology EPrint Archive
    • Shim, K.-A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.