메뉴 건너뛰기




Volumn 30, Issue 11-12, 2007, Pages 2442-2452

Providing distributed certificate authority service in cluster-based mobile ad hoc networks

Author keywords

Cluster based architecture; Distributed CA services; Mobile ad hoc network; Proactive update; Threshold secret sharing

Indexed keywords

AD HOC NETWORKS; MATHEMATICAL MODELS; PROBLEM SOLVING;

EID: 34548050159     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2007.04.011     Document Type: Article
Times cited : (30)

References (12)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 2
    • 84957626176 scopus 로고    scopus 로고
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: how to cope with perpetual leakage, Advances in cryptography - Crypto' 95, Lecture Notes in Computer Science, 963, 1998.
  • 3
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 22 11 (1979) 612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 4
    • 8344229909 scopus 로고    scopus 로고
    • M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, L,Wolf, A cluster-based security architecture for ad hoc networks, in: Proceedings of the 23rd IEEE INFOCOM'04, Hong Kong, China, March 2004, 2004.
  • 6
    • 0031234161 scopus 로고    scopus 로고
    • Adaptive clustering for mobile wireless networks
    • Lin C.R., and Gerla M. Adaptive clustering for mobile wireless networks. IEEE JSAC 15 7 (1997)
    • (1997) IEEE JSAC , vol.15 , Issue.7
    • Lin, C.R.1    Gerla, M.2
  • 7
    • 34548024656 scopus 로고    scopus 로고
    • S. Yi, R. Kravets, MOCA: mobile certificate authority for wireless ad hoc networks, 2nd Annual PKI Research Workshop Program, April 2003, 2003.
  • 8
    • 84958676203 scopus 로고    scopus 로고
    • Y. Frankel, P. Gemmell, P. MacKenzie, M. Yung, Proactive RSA, in: Advances in Cryptology - Crypto' 97, Lecture Notes in Computer Science 1294 (1997) pp. 440-454.
  • 10
    • 84941340163 scopus 로고    scopus 로고
    • Efficient, and scalable IEEE 802.11 ad-hoc-mode timing synchronization function
    • Lai T., and Zhou D. Efficient, and scalable IEEE 802.11 ad-hoc-mode timing synchronization function. Advanced Information Networking and Applications (2003) 318-323
    • (2003) Advanced Information Networking and Applications , pp. 318-323
    • Lai, T.1    Zhou, D.2
  • 11
    • 85022187530 scopus 로고    scopus 로고
    • Y. Desmedt, Y. Frankel, Shared generation of authenticators and signatures, in: Proceedings of Crypto'91, Santa Barbara, California, USA, 1991, pp. 457-469.
  • 12
    • 0032098148 scopus 로고    scopus 로고
    • Threshold signature schemes with traceable signers in group communications
    • Wang C.T., Lin C.H., and Chang C.C. Threshold signature schemes with traceable signers in group communications. Computer Communications 21 8 (1998) 771-776
    • (1998) Computer Communications , vol.21 , Issue.8 , pp. 771-776
    • Wang, C.T.1    Lin, C.H.2    Chang, C.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.