메뉴 건너뛰기




Volumn , Issue , 2007, Pages 917-921

Identity-based key issuing protocol for ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; CRYPTOGRAPHY; INTELLIGENT CONTROL; LAWS AND LEGISLATION; METROPOLITAN AREA NETWORKS; NETWORK PROTOCOLS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 48349099621     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2007.150     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 4143071452 scopus 로고    scopus 로고
    • A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions
    • X. Chen, X. Huang, and D.-Z. Du, eds.,Kluwer Publisher, Mar
    • W. Lou and Y. Fang, "A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions," Ad Hoc Wireless Networking, X. Chen, X. Huang, and D.-Z. Du, eds.,Kluwer Publisher, Mar. 2003.
    • (2003) Ad Hoc Wireless Networking
    • Lou, W.1    Fang, Y.2
  • 4
    • 24944583077 scopus 로고    scopus 로고
    • Identity-Based Access Control for Ad Hoc Groups
    • Information Security and Cryptology, Dec
    • N. Saxena, G. Tsudik, and J.H. Yi, "Identity-Based Access Control for Ad Hoc Groups," Proc. Int'l Conf. Information Security and Cryptology, Dec. 2004,pp.362-379.
    • (2004) Proc. Int'l Conf , pp. 362-379
    • Saxena, N.1    Tsudik, G.2    Yi, J.H.3
  • 5
    • 33751529199 scopus 로고    scopus 로고
    • Yanchao Zhang,Wei Liu,Wenjing Lou,Yuguang Fang, Securing Mobile Ad Hoc Networks with Certificateless Public Keys, IEEE Transactions on Dependable and Secure Computing, 3, NO. 4, Oct.-Dec.2006, pp. 386-399.
    • Yanchao Zhang,Wei Liu,Wenjing Lou,Yuguang Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Transactions on Dependable and Secure Computing, VOL. 3, NO. 4, Oct.-Dec.2006, pp. 386-399.
  • 6
    • 84874324906 scopus 로고    scopus 로고
    • Identify-Based Encryption from the Weil Pairing
    • Springer-Verlag
    • D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," in Proc. CRYPTO '01, Springer-Verlag, 2001, pp. 213-229.
    • (2001) Proc. CRYPTO '01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 23944503487 scopus 로고    scopus 로고
    • A. fen Sui, S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P.Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W.Chan, Separable and anonymous identity-based key issuing without Secure Channel, in Proc. of the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), 2, 2005, pp. 275-279.
    • A. fen Sui, S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P.Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W.Chan, "Separable and anonymous identity-based key issuing without Secure Channel", in Proc. of the 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), Vol. 2, 2005, pp. 275-279.
  • 11
    • 48349141495 scopus 로고    scopus 로고
    • Secure and Efficient Threshold Key Issuing Protocol for ID-based cryptosystems
    • Cryptology ePrint Archive, Report 2006/245
    • K. Phani Kumar, G. Shailaja, Ashutosh Saxena, "Secure and Efficient Threshold Key Issuing Protocol for ID-based cryptosystems", Cryptology ePrint Archive, Report 2006/245, 2006, http://eprint.iacr.org/2006/245.
    • (2006)
    • Phani Kumar, K.1    Shailaja, G.2    Saxena, A.3
  • 12
    • 35248880074 scopus 로고    scopus 로고
    • A. Boldyreva, Threshold Signature, Multisignature, and Blind Signature Schemes based on the Gap Diffie-Hellman-Group Signature Scheme, in PKC'03, LNCS 2567, Springer -Verlag, 2003, pp. 31-46.
    • A. Boldyreva, "Threshold Signature, Multisignature, and Blind Signature Schemes based on the Gap Diffie-Hellman-Group Signature Scheme", in PKC'03, LNCS 2567, Springer -Verlag, 2003, pp. 31-46.
  • 13
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without the random oracles
    • Advances in Cryptology-EUROCRYPT 2004, Springer-Verlag
    • D.Boneh and X.Boyen, "Short signatures without the random oracles", In Advances in Cryptology-EUROCRYPT 2004, LNCS 3027, Springer-Verlag, 2004, pp. 56-73.
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 14
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Springer-Verlag
    • P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Proc. CRYPTO '02, Springer-Verlag, 2002, pp. 354-368.
    • (2002) Proc. CRYPTO '02 , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 15
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.