메뉴 건너뛰기




Volumn 3093, Issue , 2004, Pages 232-245

Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography

Author keywords

Cluster; Elliptic curve cryptography; Mobile ad hoc network; Scalability; Threshold cryptography

Indexed keywords

AD HOC NETWORKS; CRYPTOGRAPHY; GEOMETRY; MOBILE TELECOMMUNICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SCALABILITY; TELECOMMUNICATION NETWORKS;

EID: 35048844178     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25980-0_19     Document Type: Article
Times cited : (11)

References (21)
  • 3
    • 84956983370 scopus 로고
    • Open Key Exchange: How to defeat dictionary attacks without encrypting public Keys
    • Ecole Normale Suprieure, Paris
    • S. Lucks, "Open Key Exchange: How to defeat dictionary attacks without encrypting public Keys". In Security Protocol Workshop '97, Ecole Normale Suprieure, Paris, 1992.
    • (1992) Security Protocol Workshop '97
    • Lucks, S.1
  • 5
  • 9
    • 3042629977 scopus 로고    scopus 로고
    • Technical Report UIUCDCS-R-2002-2290/UILU-ENG-2002-1734, University of Illinois at Urbana-Champaign, July
    • S. Yi, R. Kravets, "Key Management for Heterogeneous Ad Hoc Wireless Networks". Technical Report UIUCDCS-R-2002-2290/UILU-ENG-2002-1734, University of Illinois at Urbana-Champaign, July 2002.
    • (2002) Key Management for Heterogeneous Ad Hoc Wireless Networks
    • Yi, S.1    Kravets, R.2
  • 12
    • 0035009259 scopus 로고    scopus 로고
    • A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks
    • S. Banerjee, S. Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks" In Proc. of IEEE INFOCOM, pages 1028-1037, 2001.
    • (2001) Proc. of IEEE INFOCOM , pp. 1028-1037
    • Banerjee, S.1    Khuller, S.2
  • 15
    • 84957626176 scopus 로고
    • Proactive Secret Sharing or: How to Cope with Perpetual Leakage
    • D. Coppersmith, editor, Proc. of CRYPTO'95
    • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage". In D. Coppersmith, editor, Proc. of CRYPTO'95, volume 963 of LNCS, pages 339-352, 1995.
    • (1995) LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 16
    • 0010316932 scopus 로고
    • Master's Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA, September
    • S. Jarecki , "Proactive Secret Sharing and Public Key Cryptosystems", Master's Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA, September 1995.
    • (1995) Proactive Secret Sharing and Public Key Cryptosystems
    • Jarecki, S.1
  • 18
    • 85023809951 scopus 로고
    • Threshold cryptosystems. Advances in Cryptology
    • CRYPTO
    • Y. Desmedt, Y. Frankel, "Threshold cryptosystems. Advances in Cryptology"- CRYPTO, LNCS 435:307-315, 1990.
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 19
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman, "A practical scheme for non-interactive verifiable secret sharing". In Proc. of IEEE Fund. Of Comp., Sci., pages 427-437, 1987.
    • (1987) Proc. of IEEE Fund. of Comp., Sci. , pp. 427-437
    • Feldman, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.