-
1
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Paris, France
-
Sanzgiri K, Dahill B, Levine B N, et al. A secure routing protocol for ad hoc networks [A]. Proc 10th IEEE International Conference on Network Protocols [C]. Paris, France: [s.n.], 2002. 78-87.
-
(2002)
Proc 10th IEEE International Conference on Network Protocols
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
-
3
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas Z J. Securing ad hoc networks [J]. IEEE Network, 1999, 13 (6): 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Riverside, USA
-
Kong J, Zerfos P, Luo H, et al. Providing robust and ubiquitous security support for mobile ad hoc networks [A]. Proc 2001 International Conference on Network Protocols [C]. Riverside, USA: [s.n.], 2001. 251-260.
-
(2001)
Proc 2001 International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
-
5
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
Taormina-Giardini Naxos, Italy
-
Luo H, Kong J, Zerfos P, et al. Self-securing ad hoc wireless networks [A]. Proc Seventh IEEE Symposium on Computersand Communications [C]. Taormina-Giardini Naxos, Italy: [s.n.], 2002. 567-574.
-
(2002)
Proc Seventh IEEE Symposium on Computersand Communications
, pp. 567-574
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
-
6
-
-
84943807207
-
Toward secure key distribution in truly ad hoc networks
-
Orlando, FL, USA
-
Khalili A, Katz J, Arbaugh W A. Toward secure key distribution in truly ad hoc networks [A]. Proc 2003 Symposiumon Applications and the Internet Workshops [C]. Orlando, FL, USA: [s.n.], 2003. 342-364.
-
(2003)
Proc 2003 Symposiumon Applications and the Internet Workshops
, pp. 342-364
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
7
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
-
Deng H, Agrawal D. TIDS: Threshold and identity-based security scheme for wireless ad hoc networks [J]. Ad Hoc Networks, 2004, 2 (3): 291-307.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.2
-
8
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Springer-Verlag
-
Gentry C. Certificate-based encryption and the certificate revocation problem [A]. Biham E. Lecture Notes in Computer Science 2656 [C]. [s.l.]: Springer-Verlag, 2003. 272-293.
-
(2003)
Biham E. Lecture Notes in Computer Science 2656
, pp. 272-293
-
-
Gentry, C.1
-
10
-
-
84874324906
-
Identity-based encryption from Theweil pairing
-
Kilian J. Springer-Verlag
-
Boneh D, Franklin M. Identity-based encryption from Theweil pairing [A]. Kilian J. Lecture Notes in Computer Science 2139 [C]. [s.l.]: Springer-Verlag, 2001. 213-229.
-
(2001)
Lecture Notes in Computer Science 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22 (11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
0003027707
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults [A]. Proc 26th IEEE Symposium on Foundations of Computer Science [C]. Portland, OR, USA: [s.n.], 1985. 251-160.
-
(1985)
Proc 26th IEEE Symposium on Foundations of Computer Science
, pp. 160-251
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0023538330
-
A practical scheme for non-interactive verifiable secret sharing
-
Los Angeles, CA, USA
-
Feldman P. A practical scheme for non-interactive verifiable secret sharing [A]. Proc 28th IEEE Symposium on Foundations of Computer Science [C]. Los Angeles, CA, USA: [s.n.], 1987. 427-437.
-
(1987)
Proc 28th IEEE Symposium on Foundations of Computer Science
, pp. 427-437
-
-
Feldman, P.1
-
14
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Davies D.W. Springer-Verlag
-
Pedersen T. A threshold cryptosystem without a trusted party [A]. Davies D W. Lecture Notes in Computer Science 547 [C]. [s.l.]: Springer-Verlag, 1991. 522-526.
-
(1991)
Lecture Notes in Computer Science 547
, pp. 522-526
-
-
Pedersen, T.1
-
15
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Coppersmith D. Springer-Verlag
-
Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing or: How to cope with perpetual leakage [A]. Coppersmith D. Lecture Notes in Computer Science 963 [C]. [s.l.]: Springer-Verlag, 1995. 457-469.
-
(1995)
Lecture Notes in Computer Science 963
, pp. 457-469
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
|