메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1681-1685

Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks

Author keywords

Distributed certificate authority; MANET; Security; Sybil attack

Indexed keywords

COMPUTER CRIME; MOBILE TELECOMMUNICATION SYSTEMS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SERVERS; THRESHOLD ELEMENTS;

EID: 33846626862     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2005.1577936     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, "How to share a secret," Communications of the ACM, Vol.22, pp. 612 - 613, November 1979
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 2
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Proceedings of Advances in Cryptography Crypto 89, Springer-Verlag, pp
    • Y. Desmedt and Y. Frankel, "Threshold cryptosystems," Proceedings of Advances in Cryptography (Crypto 89), Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, pp. 307 - 315, 1989
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 4
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, Vol. 13, No. 6, pp. 24-30, November/December 1999
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 8
    • 0041418127 scopus 로고    scopus 로고
    • IPv6 autoconfiguration in large scale mobile ad-hoc networks
    • Florence, Italy, February
    • K. Weniger and M. Zitterbart, "IPv6 autoconfiguration in large scale mobile ad-hoc networks," In Proceedings of European Wireless 2002, Florence, Italy, February 2002
    • (2002) Proceedings of European Wireless
    • Weniger, K.1    Zitterbart, M.2
  • 12
    • 8344266135 scopus 로고    scopus 로고
    • Prophet Address Allocation for Large Scale MANETs
    • November
    • H. Zhou, L. M. Ni, and M. W. Mutka, "Prophet Address Allocation for Large Scale MANETs," Ad Hoc Networks Journal, Vol. 1, Issue 4, pp 423-434, November 2003
    • (2003) Ad Hoc Networks Journal , vol.1 , Issue.4 , pp. 423-434
    • Zhou, H.1    Ni, L.M.2    Mutka, M.W.3
  • 13
    • 85034652527 scopus 로고
    • Some applications of multiple key ciphers
    • Proceedings of Advances in Cryptography Eurocrypt'88, Springer-Verlag, pp
    • C. Boyd, "Some applications of multiple key ciphers," In Proceedings of Advances in Cryptography (Eurocrypt'88), Lecture Notes in Computer Science, Springer-Verlag, pp. 455 - 467, 1988
    • (1988) Lecture Notes in Computer Science , pp. 455-467
    • Boyd, C.1
  • 14
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • Proceedings of Advances in Cryptology Eurocrypt'91, Springer-Verlag, pp
    • T. P. Pedersen, "A threshold cryptosystem without a trusted party," In Proceedings of Advances in Cryptology (Eurocrypt'91), Lecture Notes in Computer Science, Vol. 547, Springer-Verlag, pp. 522-526, 1991
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 522-526
    • Pedersen, T.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.