메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2414-2424

Distributed symmetric key management for mobile ad Hoc networks

Author keywords

Ad hoc network; Cover free family; Distributed cryptographic protocol; Key predistribution; Privacy homomorphism; Probabilistic method

Indexed keywords

AD HOC NETWORK; COVER-FREE FAMILY; DISTRIBUTED CRYPTOGRAPHIC PROTOCOL; KEY PREDISTRIBUTION; PRIVACY HOMOMORPHISM; PROBABILISTIC METHODS;

EID: 4143131440     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2004.1354663     Document Type: Conference Paper
Times cited : (98)

References (33)
  • 1
    • 0023408117 scopus 로고
    • Processing encrypted data
    • Sept
    • N. Ahituv, Y. Lapid, and S. Neumann, "Processing Encrypted Data", Communications of ACM, vol. 20, no. 9, p. 777-780, Sept 1987.
    • (1987) Communications of ACM , vol.20 , Issue.9 , pp. 777-780
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 3
    • 0032218239 scopus 로고    scopus 로고
    • Communication complexity of group key distribution
    • Nov.
    • K. Becker, and U. Wille, "Communication complexity of group key distribution", in proc. ACM CCS'98, Nov. 1998, p. 1-6.
    • (1998) Proc. ACM CCS'98 , pp. 1-6
    • Becker, K.1    Wille, U.2
  • 4
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation system
    • LNCS
    • R. Blom, "An Optimal Class of Symmetric Key Generation System", in Advances in Cryptology - Eurocrypt'84, LNCS vol. 209, p. 335-338, 1985.
    • (1985) Advances in Cryptology - Eurocrypt'84 , vol.209 , pp. 335-338
    • Blom, R.1
  • 5
    • 84948984838 scopus 로고
    • Space requirements for broadcast encryption
    • LNCS
    • C. Blundo, and A. Cresti, "Space requirements for broadcast encryption", in Advances in Cryptology - Eurocrypt'94, LNCS vol. 950, p. 471-486, 1994.
    • (1994) Advances in Cryptology - Eurocrypt'94 , vol.950 , pp. 471-486
    • Blundo, C.1    Cresti, A.2
  • 8
    • 0000288916 scopus 로고
    • A secure and efficient conference key distribution system
    • May
    • M. Burmester, and Y. Desmedt. "A secure and efficient conference key distribution system'', in proc. Eurocrypt'1994. May 1994, p. 275-286.
    • (1994) Proc. Eurocrypt'1994 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie, and M. E. Hellman. "New Directions in Cryptography", IEEE Trans. Inform. Theory, IT-22, p. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 51249175955 scopus 로고
    • Families of finite sets in which no set is covered by the union of r others
    • 1985
    • P. Erdös, P. Frankl, and Z. Füredi. "Families of finite sets in which no set is covered by the union of r others", Israel Journal of Mathematics vol. 51 (1985), no. 1-2. p.75-89, 1985.
    • (1985) Israel Journal of Mathematics , vol.51 , Issue.1-2 , pp. 75-89
    • Erdös, P.1    Frankl, P.2    Füredi, Z.3
  • 15
    • 0038341106 scopus 로고    scopus 로고
    • A Key-management scheme for distributed sensor networks
    • Nov.
    • L. Eschenauer, and V. D. Gligor. "A Key-Management Scheme for Distributed Sensor Networks", in proc. ACM CCS'02, Nov. 2002.
    • (2002) Proc. ACM CCS'02
    • Eschenauer, L.1    Gligor, V.D.2
  • 19
    • 0020180459 scopus 로고
    • A conference key distribution system
    • Sept.
    • I. Ingemarsson, D. T. Tang, and C. K. Wong. "A conference key distribution system", IEEE Trans. on IT, vol. 28, no. 5, p. 714-720, Sept. 1982.
    • (1982) IEEE Trans. on IT , vol.28 , Issue.5 , pp. 714-720
    • Ingemarsson, I.1    Tang, D.T.2    Wong, C.K.3
  • 21
    • 0003237987 scopus 로고
    • The kerberos network authentication service (V5)
    • September
    • J. Kohl, and B. Neuman. "The Kerberos Network Authentication Service (V5), RFC 1510, September, 1993.
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, B.2
  • 22
    • 85027184925 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • R. Kumar, S. Rajagopalan, and A. Sahai. "Coding constructions for blacklisting problems without computational assumptions", in Crypto'99, 1999.
    • (1999) Crypto'99
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 23
    • 84989455644 scopus 로고
    • On the key predistribution systems: A practical solution to the key distribution problem
    • LNCS
    • T. Matsumoto, and H. Imai. "On the key predistribution systems: A practical solution to the key distribution problem", in Advances in Cryptology - Crypto'87, LNCS vol. 293, p. 185-193, 1988.
    • (1988) Advances in Cryptology - Crypto'87 , vol.293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 26
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • LNCS
    • D. Naor, M. Naor, and J. Lotspiech. "Revocation and Tracing Schemes for Stateless Receivers", in Advances in Cryptology - Crypto'01, LNCS vol. 2139, p. 41-62, 2001.
    • (2001) Advances in Cryptology - Crypto'01 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 27
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, and M. Schroeder. "Using Encryption for Authentication in Large Networks of Computers", in Commu. of ACM, vol. 21, no. 12. p. 993-999, 1978.
    • (1978) Commu. of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • LNCS
    • P. Paillier. "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", in Advances in Cryptoloay - Eurocrypt'99, LNCS vol. 1592, p. 223-238, 1999.
    • (1999) Advances in Cryptoloay - Eurocrypt'99 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 30
    • 0003582910 scopus 로고    scopus 로고
    • Addison Wesley Professional, Dec.
    • C. E. Perkins. Ad Hoc Networking. Addison Wesley Professional, Dec. 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.