메뉴 건너뛰기




Volumn 17, Issue 1, 2007, Pages 3-15

A heterogeneous-network aided public-key management scheme for mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CAPACITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; ROUTERS; SECURITY SYSTEMS; UNMANNED VEHICLES;

EID: 33846561223     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.603     Document Type: Article
Times cited : (15)

References (33)
  • 4
    • 33846569378 scopus 로고    scopus 로고
    • Wireless IP Network Standard. P.S0001-A-1, 3GPP2, 2000.
    • Wireless IP Network Standard. P.S0001-A-1, 3GPP2, 2000.
  • 5
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Yang H, Luo H, Ye F, Lu S, Zhang L. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communication 2004; 11(1): 38-47.
    • (2004) IEEE Wireless Communication , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 7
    • 13244276488 scopus 로고    scopus 로고
    • Secure routing in mobile wireless ad hoc networks
    • Gupte S, Singhal M. Secure routing in mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1): 151-174.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 151-174
    • Gupte, S.1    Singhal, M.2
  • 8
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu YC, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1): 175-192.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.C.1    Johnson, D.B.2    Perrig, A.3
  • 14
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
    • Deng H, Agrawal DP. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks 2004; 2(3): 291-307.
    • (2004) Ad Hoc Networks , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L, Haas Z. Securing ad hoc networks. IEEE Networks 1999; 13(6): 23-30.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 23-30
    • Zhou, L.1    Haas, Z.2
  • 17
    • 0024037372 scopus 로고
    • VSAT networks: Architectures, protocol, and management
    • Chitre DM, Mccoskey JS. VSAT networks: architectures, protocol, and management. IEEE Communication Magazine 1988; 26(7): 28-38.
    • (1988) IEEE Communication Magazine , vol.26 , Issue.7 , pp. 28-38
    • Chitre, D.M.1    Mccoskey, J.S.2
  • 18
    • 0347309397 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of key distribution system for VSAT satellite communication
    • Tseng YM. Cryptanalysis and improvement of key distribution system for VSAT satellite communication. Informatica 2002; 13(3): 369-376.
    • (2002) Informatica , vol.13 , Issue.3 , pp. 369-376
    • Tseng, Y.M.1
  • 19
    • 0032163788 scopus 로고    scopus 로고
    • Key distribution for secure VSAT satellite communications
    • Park JH, Lim SB. Key distribution for secure VSAT satellite communications. IEEE Transactions on Broadcasting 1998; 44(3): 274-277.
    • (1998) IEEE Transactions on Broadcasting , vol.44 , Issue.3 , pp. 274-277
    • Park, J.H.1    Lim, S.B.2
  • 20
    • 0034590134 scopus 로고    scopus 로고
    • UAV-aided intelligent routing for ad-hoc wireless network in single-area theater
    • Gu DL, Pei G, Ly H, Gerla M, Zhang B, Hong X. UAV-aided intelligent routing for ad-hoc wireless network in single-area theater. IEEE WCNC 2000; 1220-1225.
    • (2000) IEEE WCNC , pp. 1220-1225
    • Gu, D.L.1    Pei, G.2    Ly, H.3    Gerla, M.4    Zhang, B.5    Hong, X.6
  • 21
    • 14744269381 scopus 로고    scopus 로고
    • Civilian unmanned aerial vehicles: Overview of European effort and challenges for the future
    • Goraj Z. Civilian unmanned aerial vehicles: overview of European effort and challenges for the future. Aviation Journal 2003; 7(2): 1-18.
    • (2003) Aviation Journal , vol.7 , Issue.2 , pp. 1-18
    • Goraj, Z.1
  • 22
    • 9144267125 scopus 로고    scopus 로고
    • Authentication and billing protocols for the integration of WLAN and 3G Networks
    • Tseng YM, Yang CC, Su JH. Authentication and billing protocols for the integration of WLAN and 3G Networks. Wireless Personal Communications 2004; 29(3-4): 351-366.
    • (2004) Wireless Personal Communications , vol.29 , Issue.3-4 , pp. 351-366
    • Tseng, Y.M.1    Yang, C.C.2    Su, J.H.3
  • 23
    • 0345871182 scopus 로고    scopus 로고
    • Hiperlan/2 public access interworking with 3G cellular systems
    • Mccann S, Flygare H. Hiperlan/2 public access interworking with 3G cellular systems. Wireless Networks 2004; 10(1): 43-51.
    • (2004) Wireless Networks , vol.10 , Issue.1 , pp. 43-51
    • Mccann, S.1    Flygare, H.2
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 33846597047 scopus 로고    scopus 로고
    • ITU-T recommendation X.509. Information technology-open system interconnection-the directory: authentication framework, June 1997.
    • ITU-T recommendation X.509. Information technology-open system interconnection-the directory: authentication framework, June 1997.
  • 27
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • Dobbertin H. The status of MD5 after a recent attack. CryptoBytes 1996; 2(2): 1-6.
    • (1996) CryptoBytes , vol.2 , Issue.2 , pp. 1-6
    • Dobbertin, H.1
  • 28
    • 0001312077 scopus 로고
    • Message recovery for signature schemes based on the discrete logarithm
    • Springer: Berlin, May
    • Nyberg K, Rueppel RA. Message recovery for signature schemes based on the discrete logarithm. In EUROCRYPT'94, Springer: Berlin, May 1994; 175-190.
    • (1994) EUROCRYPT'94 , pp. 175-190
    • Nyberg, K.1    Rueppel, R.A.2
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of ACM 1978; 21(2): 120-126.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 33
    • 0141518232 scopus 로고    scopus 로고
    • On the security methods for protecting password transmission
    • Tseng YM, Jan JK, Chien HY. On the security methods for protecting password transmission. Informatica 2001; 12(3): 469-476.
    • (2001) Informatica , vol.12 , Issue.3 , pp. 469-476
    • Tseng, Y.M.1    Jan, J.K.2    Chien, H.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.