메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 375-389

Public key cryptography sans certificates in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTER SIMULATION; DATA PRIVACY; NETWORKS (CIRCUITS); SECURITY OF DATA; THRESHOLD ELEMENTS;

EID: 33746610485     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_26     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 2
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • Dept. of Computer Science, UCLA
    • Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-200030, Dept. of Computer Science, UCLA (2000) Available online at http://citeseer.ist.psu.edu/luo00ubiquitous.html.
    • (2000) Technical Report , vol.TR-200030
    • Luo, H.1    Lu, S.2
  • 14
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • University of Massachusetts
    • Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Technical Report UM-CS-2001-037, University of Massachusetts (2001)
    • (2001) Technical Report , vol.UM-CS-2001-037
    • Dahill, B.1    Levine, B.2    Royer, E.3    Shields, C.4
  • 15
    • 21244475378 scopus 로고    scopus 로고
    • Sensing for danger
    • Hills, R.: Sensing for danger. Science Technology Report (2001) Available at http://www.llnl.gov/str/JulAug01/Hills.html.
    • (2001) Science Technology Report
    • Hills, R.1
  • 17
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: CRYPTO. (2001) 213-229
    • (2001) CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 20
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - How to sign with RSA and Rabin
    • EUROCRYPT'96
    • Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and Rabin. In: EUROCRYPT'96. Volume 1070 of LNCS. (1996) 399-416
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 21
    • 84874800178 scopus 로고    scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal: A public-key cryptosystem and a signature scheme based on discrete logarithms. In: IEEE Transactions in Information Theory (IT-31). (1999) 469-472
    • (1999) IEEE Transactions in Information Theory (IT-31) , pp. 469-472
  • 22
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4 (1991) 161-174
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 23
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • EUROCRYPT'96
    • Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: EUROCRYPT'96. Volume 1070 of LNCS. (1996) 387-398
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 25
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17 (1988) 281-308
    • (1988) SIAM Journal on Computing , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 26
    • 72749106279 scopus 로고    scopus 로고
    • Algorithms for multi-exponentiation
    • Möller, B.: Algorithms for multi-exponentiation. In: Selected Areas in Cryptography. (2001) 165-180
    • (2001) Selected Areas in Cryptography , pp. 165-180
    • Möller, B.1
  • 27
    • 84955567079 scopus 로고    scopus 로고
    • Diffie-Hellman oracles
    • CRYPTO'96
    • Maurer, U.M., Wolf, S.: Diffie-Hellman oracles. In: CRYPTO'96. Volume 1109 of LNCS. (1996) 268-282
    • (1996) LNCS , vol.1109 , pp. 268-282
    • Maurer, U.M.1    Wolf, S.2
  • 29
    • 84974622621 scopus 로고    scopus 로고
    • Extended notions of security for multicast public key cryptosystems
    • International Colloquium on Automata, Languages and Programming (ICALP'00)
    • Baudron, O., Pointcheval, D., Stern, J.: Extended notions of security for multicast public key cryptosystems. In: International Colloquium on Automata, Languages and Programming (ICALP'00). Volume 1853 of LNCS. (2000) 499-511
    • (2000) LNCS , vol.1853 , pp. 499-511
    • Baudron, O.1    Pointcheval, D.2    Stern, J.3
  • 30
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • EUROCRYPT'00
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: EUROCRYPT'00. Volume 1807 of LNCS. (2000) 259-274
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 31
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid encryption problem
    • EUROCRYPT'04
    • Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid encryption problem. In: EUROCRYPT'04. Volume 3027 of LNCS. (2004) 171-188
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 32
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • CRYPTO'99
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO'99. Volume 1666 of LNCS. (1999) 537-554
    • (1999) LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 33
    • 35248844436 scopus 로고    scopus 로고
    • An ID-based signature from Gap-Diffie-Hellmari groups
    • Proceedings of International Workshop on Practice and Theory in Public Key Cryptography
    • Cha, J., Cheon, J.: An ID-based signature from Gap-Diffie-Hellmari Groups. In: Proceedings of International Workshop on Practice and Theory in Public Key Cryptography. Volume 2567 of LNCS. (2003) 18-30
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.