메뉴 건너뛰기




Volumn 11 E, Issue 2, 2006, Pages 152-157

Key management using certificate-based cryptosystem in ad hoc networks

Author keywords

Ad hoc network; Certificate based cryptosystem; Key management; Network security

Indexed keywords

FAILURE (MECHANICAL); MANAGEMENT; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SELF ORGANIZING MAPS;

EID: 33747827563     PISSN: 10071172     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (15)
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas Z J. Securing ad hoc networks [J]. IEEE Network, 1999, 13 (6): 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 4
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • Riverside, USA
    • Kong J, Zerfos P, Luo H, et al. Providing robust and ubiquitous security support for mobile ad hoc networks [A]. Proc 2001 International Conference on Network Protocols [C]. Riverside, USA: [s.n.], 2001. 251-260.
    • (2001) Proc 2001 International Conference on Network Protocols , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3
  • 7
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
    • Deng H, Agrawal D. TIDS: Threshold and identity-based security scheme for wireless ad hoc networks [J]. Ad Hoc Networks, 2004, 2 (3): 291-307.
    • (2004) Ad Hoc Networks , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.2
  • 8
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • Springer-Verlag
    • Gentry C. Certificate-based encryption and the certificate revocation problem [A]. Biham E. Lecture Notes in Computer Science 2656 [C]. [s.l.]: Springer-Verlag, 2003. 272-293.
    • (2003) Biham E. Lecture Notes in Computer Science 2656 , pp. 272-293
    • Gentry, C.1
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from Theweil pairing
    • Kilian J. Springer-Verlag
    • Boneh D, Franklin M. Identity-based encryption from Theweil pairing [A]. Kilian J. Lecture Notes in Computer Science 2139 [C]. [s.l.]: Springer-Verlag, 2001. 213-229.
    • (2001) Lecture Notes in Computer Science 2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22 (11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • Los Angeles, CA, USA
    • Feldman P. A practical scheme for non-interactive verifiable secret sharing [A]. Proc 28th IEEE Symposium on Foundations of Computer Science [C]. Los Angeles, CA, USA: [s.n.], 1987. 427-437.
    • (1987) Proc 28th IEEE Symposium on Foundations of Computer Science , pp. 427-437
    • Feldman, P.1
  • 14
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Davies D.W. Springer-Verlag
    • Pedersen T. A threshold cryptosystem without a trusted party [A]. Davies D W. Lecture Notes in Computer Science 547 [C]. [s.l.]: Springer-Verlag, 1991. 522-526.
    • (1991) Lecture Notes in Computer Science 547 , pp. 522-526
    • Pedersen, T.1
  • 15
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • Coppersmith D. Springer-Verlag
    • Herzberg A, Jarecki S, Krawczyk H, et al. Proactive secret sharing or: How to cope with perpetual leakage [A]. Coppersmith D. Lecture Notes in Computer Science 963 [C]. [s.l.]: Springer-Verlag, 1995. 457-469.
    • (1995) Lecture Notes in Computer Science 963 , pp. 457-469
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.