메뉴 건너뛰기




Volumn , Issue , 2003, Pages 41-53

An approach to certificate path discovery in mobile ad hoc networks

Author keywords

Certificate Path Discovery; MANET; Public Key Infrastructure; Security

Indexed keywords

ALGORITHMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 4544246598     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986865     Document Type: Conference Paper
Times cited : (12)

References (37)
  • 2
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in Ad hoc wireless networks
    • T. Imielinski and H. Korth, eds.,Kluwer Academic Publishers, Norwell Mass
    • D.B. Johnson and D.A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, T. Imielinski and H. Korth, eds.,Kluwer Academic Publishers, Norwell Mass., 1996, 153-181
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 9
    • 2642554455 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile Ad hoc networks
    • June
    • Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, Technical report EPFL/IC/200234, June, 2002
    • (2002) Technical Report , vol.EPFL-IC-200234
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 10
    • 4544258751 scopus 로고    scopus 로고
    • http://www-nrg.ee.lbl.gov/ns/
  • 11
    • 4544317411 scopus 로고    scopus 로고
    • http://www.spinnaker.com/crypt/rsaref/
  • 12
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publichers
    • David Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publichers, 1996
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.A.2
  • 18
    • 0003226048 scopus 로고    scopus 로고
    • The key note trust-management system, Version 2
    • IETF September
    • M. Blaze, J. Feigenbaum, J. Ioannids and A. Keromytis, The Key Note Trust-Management System, Version 2. RFC 2704, IETF September 1999
    • (1999) RFC , vol.2704
    • Blaze, M.1    Feigenbaum, J.2    Ioannids, J.3    Keromytis, A.4
  • 19
    • 0003495052 scopus 로고    scopus 로고
    • Overhead in mobile Ad-hoc network protocols
    • INRIA
    • P. Jacquet, L. Viennot, Overhead in Mobile Ad-hoc Network Protocols, TechReport, INRIA, 2000
    • (2000) TechReport
    • Jacquet, P.1    Viennot, L.2
  • 20
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • IETF November
    • S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, IETF November 1998
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 21
    • 0343762511 scopus 로고    scopus 로고
    • S/MIME version 2 message specification
    • IETF March
    • S. Dusse, P. Hoffman, et, al., S/MIME Version 2 Message Specification, RFC 2311, IETF March 1998
    • (1998) RFC , vol.2311
    • Dusse, S.1    Hoffman, P.2
  • 22
    • 0003286492 scopus 로고    scopus 로고
    • The TLS version 1.0
    • IETF, January
    • T. Dierks, C. Allen, The TLS version 1.0, RFC 2246, IETF, January 1999
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 24
    • 0002024864 scopus 로고
    • Lexicographic generation of ordered trees
    • S. Zaks, Lexicographic Generation of Ordered Trees, Theoret. Comput. Sci. 10 (1980)63-82
    • (1980) Theoret. Comput. Sci. , vol.10 , pp. 63-82
    • Zaks, S.1
  • 25
    • 0022094367 scopus 로고
    • Generating binary trees using rotations
    • D. Zerling, generating Binary Trees Using Rotations, J. ACM 32 (1985) 694-701
    • (1985) J. ACM , vol.32 , pp. 694-701
    • Zerling, D.1
  • 27
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • IETF, January
    • R. Housley, W. Ford, et. al, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, IETF, January 1999
    • (1999) RFC , vol.2459
    • Housley, R.1    Ford, W.2
  • 28
    • 0004179384 scopus 로고    scopus 로고
    • Efficient certificate revocation
    • S. Micali, Efficient Certificate Revocation, Technical Memo MIT/LCS/TM-542b,
    • Technical Memo , vol.MIT-LCS-TM-542B
    • Micali, S.1
  • 30
    • 4544270332 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure: Roadmap
    • A. Arsenault, S. Turner, Internet X.509 Public Key Infrastructure: Roadmap, IETF Draft, 2003
    • (2003) IETF Draft
    • Arsenault, A.1    Turner, S.2
  • 31
    • 4544325186 scopus 로고    scopus 로고
    • Public key infrastructure (PKI) technical specification: Part A - Technical concept of operations
    • September
    • W.E. Burr, Public Key Infrastructure (PKI) technical Specification: Part A - Technical Concept of Operations, Working Draft, September 1998, available at http://csrc.nist.gov/pki/twg/baseline/pkicon20b.PDF
    • (1998) Working Draft
    • Burr, W.E.1
  • 32
    • 0141751849 scopus 로고    scopus 로고
    • Trust models and management in public-key infrastructures
    • November
    • John Linn, Trust Models and Management in Public-Key Infrastructures, RAS Technical Report, November 2000, available at http://www.rsasecurity.com/ rsalabs/technotes/
    • (2000) RAS Technical Report
    • Linn, J.1
  • 33
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • September
    • Carl A. Gunter and Trevor Jim. Policy-directed certificate retrieval. Software: Practice & Experience, 30(15):1609-1640, September 1999
    • (1999) Software: Practice & Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 36
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad hoc networks
    • September
    • Y. Hu, A. Perrig, D. B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks, MobiCom 2002, September 2002
    • (2002) MobiCom 2002
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.