-
1
-
-
4143071452
-
A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions
-
X. Chen, X. Huang, and D.-Z. Du, eds.,Kluwer Publisher, Mar
-
W. Lou and Y. Fang, "A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions," Ad Hoc Wireless Networking, X. Chen, X. Huang, and D.-Z. Du, eds.,Kluwer Publisher, Mar. 2003.
-
(2003)
Ad Hoc Wireless Networking
-
-
Lou, W.1
Fang, Y.2
-
2
-
-
84943807207
-
Toward Secure Key Distribution in Truly Ad Hoc Networks
-
Jan
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad Hoc Networks," Proc. IEEE Workshop Security and Assurance in Ad Hoc Networks, Jan. 2003, pp.342-346.
-
(2003)
Proc. IEEE Workshop Security and Assurance in Ad Hoc Networks
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
3
-
-
3042546547
-
Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks
-
Apr
-
H. Deng, A. Mukherjee, and D. Agrawal, "Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks," Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC '04), Apr. 2004, pp.107-115.
-
(2004)
Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC '04)
, pp. 107-115
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.3
-
4
-
-
24944583077
-
Identity-Based Access Control for Ad Hoc Groups
-
Information Security and Cryptology, Dec
-
N. Saxena, G. Tsudik, and J.H. Yi, "Identity-Based Access Control for Ad Hoc Groups," Proc. Int'l Conf. Information Security and Cryptology, Dec. 2004,pp.362-379.
-
(2004)
Proc. Int'l Conf
, pp. 362-379
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
5
-
-
33751529199
-
-
Yanchao Zhang,Wei Liu,Wenjing Lou,Yuguang Fang, Securing Mobile Ad Hoc Networks with Certificateless Public Keys, IEEE Transactions on Dependable and Secure Computing, 3, NO. 4, Oct.-Dec.2006, pp. 386-399.
-
Yanchao Zhang,Wei Liu,Wenjing Lou,Yuguang Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Transactions on Dependable and Secure Computing, VOL. 3, NO. 4, Oct.-Dec.2006, pp. 386-399.
-
-
-
-
6
-
-
84874324906
-
Identify-Based Encryption from the Weil Pairing
-
Springer-Verlag
-
D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," in Proc. CRYPTO '01, Springer-Verlag, 2001, pp. 213-229.
-
(2001)
Proc. CRYPTO '01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
24744440154
-
Secure Key Issuing in ID-based Cryptography
-
ACS Conferences in Research and Practice in Information Technology
-
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, S. Yoo, "Secure Key Issuing in ID-based Cryptography", In proceedings of the Second Australian Information Security Workshop-AISW2004, ACS Conferences in Research and Practice in Information Technology vol.32, 2004, pp.69-74.
-
(2004)
proceedings of the Second Australian Information Security Workshop-AISW2004
, vol.32
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
8
-
-
24744468599
-
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems
-
IEEE Computer Society
-
R. Gangishetti, M. C. Gorantla, M. L. Das, A. Saxena and V. P. Gulati, "An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems", In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05), Volume-1, IEEE Computer Society, 2005, pp. 674-678.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)
, vol.1
, pp. 674-678
-
-
Gangishetti, R.1
Gorantla, M.C.2
Das, M.L.3
Saxena, A.4
Gulati, V.P.5
-
9
-
-
23944503487
-
-
A. fen Sui, S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P.Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W.Chan, Separable and anonymous identity-based key issuing without Secure Channel, in Proc. of the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), 2, 2005, pp. 275-279.
-
A. fen Sui, S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P.Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W.Chan, "Separable and anonymous identity-based key issuing without Secure Channel", in Proc. of the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Vol. 2, 2005, pp. 275-279.
-
-
-
-
10
-
-
33845566093
-
An Improvement of an Identity-Based Key Issuing Protocol
-
April
-
Feng Cao, Zhenfu Cao, Licheng Wang, "An Improvement of an Identity-Based Key Issuing Protocol", In Proceedings of the First International Multi-Symposiums on Computer and computational Sciences (TMSCCS'06), April, 2006,pp.13-18.
-
(2006)
Proceedings of the First International Multi-Symposiums on Computer and computational Sciences (TMSCCS'06)
, pp. 13-18
-
-
Cao, F.1
Cao, Z.2
Wang, L.3
-
11
-
-
48349141495
-
Secure and Efficient Threshold Key Issuing Protocol for ID-based cryptosystems
-
Cryptology ePrint Archive, Report 2006/245
-
K. Phani Kumar, G. Shailaja, Ashutosh Saxena, "Secure and Efficient Threshold Key Issuing Protocol for ID-based cryptosystems", Cryptology ePrint Archive, Report 2006/245, 2006, http://eprint.iacr.org/2006/245.
-
(2006)
-
-
Phani Kumar, K.1
Shailaja, G.2
Saxena, A.3
-
12
-
-
35248880074
-
-
A. Boldyreva, Threshold Signature, Multisignature, and Blind Signature Schemes based on the Gap Diffie-Hellman-Group Signature Scheme, in PKC'03, LNCS 2567, Springer -Verlag, 2003, pp. 31-46.
-
A. Boldyreva, "Threshold Signature, Multisignature, and Blind Signature Schemes based on the Gap Diffie-Hellman-Group Signature Scheme", in PKC'03, LNCS 2567, Springer -Verlag, 2003, pp. 31-46.
-
-
-
-
13
-
-
35048848152
-
Short signatures without the random oracles
-
Advances in Cryptology-EUROCRYPT 2004, Springer-Verlag
-
D.Boneh and X.Boyen, "Short signatures without the random oracles", In Advances in Cryptology-EUROCRYPT 2004, LNCS 3027, Springer-Verlag, 2004, pp. 56-73.
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
14
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Springer-Verlag
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Proc. CRYPTO '02, Springer-Verlag, 2002, pp. 354-368.
-
(2002)
Proc. CRYPTO '02
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
15
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|