메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Secured key exchange protocol in wireless mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE COMPUTING; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SWITCHING;

EID: 42749104092     PISSN: 10716572     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (14)
  • 1
    • 33847220514 scopus 로고    scopus 로고
    • David B. Johnson, David A. Malte, Yih-Chun Hu, and Jorjeta G, Jeteheva, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Mobile Ad Hoc Networks Working Group, Internet Draft, in work in progress, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09. txt, 15 April 2003.
    • David B. Johnson, David A. Malte, Yih-Chun Hu, and Jorjeta G, Jeteheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, in work in progress, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09. txt, 15 April 2003.
  • 3
    • 10744229755 scopus 로고    scopus 로고
    • Routing and Security in Mobile Ad Hoc Networks
    • February
    • Nikola Milanovic, Miroslaw Malek, Anthony Davidson and Veljko Milutinovic, "Routing and Security in Mobile Ad Hoc Networks," IEEE Computer, Vol. 37, No. 2, pp. 61-65, February 2004.
    • (2004) IEEE Computer , vol.37 , Issue.2 , pp. 61-65
    • Milanovic, N.1    Malek, M.2    Davidson, A.3    Milutinovic, V.4
  • 4
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • L. Zhou, and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Journalz, Vol. 13, No. 6, pp. 24-30, 1999.
    • (1999) IEEE Network Journalz , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 7
    • 3042546547 scopus 로고    scopus 로고
    • H. Deng, A. Mukherjee, and D.P. Agrawal, Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, 1, No. 1, pp. 107-111, January 2004.
    • H. Deng, A. Mukherjee, and D.P. Agrawal, "Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks," Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, Vol. 1, No. 1, pp. 107-111, January 2004.
  • 8
    • 0242678584 scopus 로고    scopus 로고
    • Self-Organized Public-Key Management for Mobile Ad Hoc Networks
    • January-March
    • S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, Vol. 2, No. 1, pp. 52-64, January-March 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 9
    • 85020598353 scopus 로고    scopus 로고
    • A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984.
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984.
  • 12
    • 33847228157 scopus 로고    scopus 로고
    • Models of Authentications in Ad Hoc Networks and their Related Network Properties
    • K. Hoeper, and G. Gong, "Models of Authentications in Ad Hoc Networks and their Related Network Properties," International Association for Cryptologic Research, http://www.iacr.org/, 2004.
    • (2004) International Association for Cryptologic Research
    • Hoeper, K.1    Gong, G.2
  • 13
    • 84964242030 scopus 로고
    • Key Distribution Systems Based on Identification Information
    • Springer
    • E. Okamoto, "Key Distribution Systems Based on Identification Information," Advances in Cryptology -Crypto '87, pp. 194-202, Springer, 1987.
    • (1987) Advances in Cryptology -Crypto '87 , pp. 194-202
    • Okamoto, E.1
  • 14
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
    • (1978) Comm. of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.