메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2-10

NetTRUST: Mixed networks trust infrastructure based on threshold cryptography

Author keywords

Mixed architecture; PKI; Public key certificate management; Threshold cryptography; Trust models

Indexed keywords

AD HOC NETWORKS; ARCHITECTURE; CELLULAR NEURAL NETWORKS; CELLULAR TELEPHONE SYSTEMS; COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; JAVA PROGRAMMING LANGUAGE; MAGNETIC ANISOTROPY; MAGNETIC LOGIC DEVICES; TELECOMMUNICATION NETWORKS;

EID: 51349140477     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOM.2007.4550299     Document Type: Conference Paper
Times cited : (6)

References (33)
  • 3
    • 33746299217 scopus 로고    scopus 로고
    • th IEEE International Parallel and Distributed Processing Symposium, 2005.
    • th IEEE International Parallel and Distributed Processing Symposium, 2005.
  • 4
    • 51349157931 scopus 로고    scopus 로고
    • th Australasian Computer Science Conference, 2004.
    • th Australasian Computer Science Conference, 2004.
  • 5
    • 3042542188 scopus 로고    scopus 로고
    • PILOT: Probabilistic Lightweight group communication system for Mobile Ad hoc Networks
    • J. Luo, P. Eugster, and J. Hubaux. PILOT: Probabilistic Lightweight group communication system for Mobile Ad hoc Networks. IEEE Transactions on Mobile Computing, 2004.
    • (2004) IEEE Transactions on Mobile Computing
    • Luo, J.1    Eugster, P.2    Hubaux, J.3
  • 7
    • 34047124613 scopus 로고    scopus 로고
    • P. Ratanchandani and R. Kravets. A Hybrid Approach to Internet Connectivity for Mobile Ad Hoc Networks. In Wireless Communications and. Networking Conference IEEE, 2003.
    • P. Ratanchandani and R. Kravets. A Hybrid Approach to Internet Connectivity for Mobile Ad Hoc Networks. In Wireless Communications and. Networking Conference IEEE, 2003.
  • 13
    • 51349102004 scopus 로고    scopus 로고
    • Comparison of Inter-Area Rekeying Algorithms for SecureWireless Group Communications
    • C. Zhang, B. DeCleene, J. Kurose, and D. Towsley. Comparison of Inter-Area Rekeying Algorithms for SecureWireless Group Communications. Elsevier Science Publishers, 2002.
    • (2002) Elsevier Science Publishers
    • Zhang, C.1    DeCleene, B.2    Kurose, J.3    Towsley, D.4
  • 16
    • 0242696192 scopus 로고    scopus 로고
    • S. Buchegger and J. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness In Dynamic Ad-hoc NeTworks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, 2002.
    • S. Buchegger and J. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness In Dynamic Ad-hoc NeTworks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, 2002.
  • 20
    • 0035704362 scopus 로고    scopus 로고
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of International Conference on Network Protocols (ICNP'01), 2001.
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of International Conference on Network Protocols (ICNP'01), 2001.
  • 21
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and Robust Authentication Services for Ad hoc Wireless Networks
    • H. Luo and S. Lu. Ubiquitous and Robust Authentication Services for Ad hoc Wireless Networks. Technical Report, UCLA Computer Science, 2000.
    • (2000) Technical Report, UCLA Computer Science
    • Luo, H.1    Lu, S.2
  • 22
    • 85177499934 scopus 로고    scopus 로고
    • S. Marti, T. Giuli, and K. Lai. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00, 2000.
    • S. Marti, T. Giuli, and K. Lai. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM'00, 2000.
  • 23
    • 0033314753 scopus 로고    scopus 로고
    • An Overview of PKI Trusts Models
    • R. Perlman. An Overview of PKI Trusts Models. IEEE Network, 1999.
    • (1999) IEEE Network
    • Perlman, R.1
  • 24
    • 51349118462 scopus 로고    scopus 로고
    • S. Chokhani and W. Ford. Internet X509 PKI Certificate Policy and Certification Practices Framework. RFC-2527, 1999.
    • S. Chokhani and W. Ford. Internet X509 PKI Certificate Policy and Certification Practices Framework. RFC-2527, 1999.
  • 28
    • 51349119932 scopus 로고    scopus 로고
    • A. Abdulrahman and S. Hailes. A Distributed Trust Model. In Proceedings 97 New Security Paradigms, 1997.
    • A. Abdulrahman and S. Hailes. A Distributed Trust Model. In Proceedings 97 New Security Paradigms, 1997.
  • 29
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • C. Neuman and T. Ts'o. Kerberos: an Authentication Service for Computer Networks. IEEE Communications, 1994.
    • (1994) IEEE Communications
    • Neuman, C.1    Ts'o, T.2
  • 30
    • 51349091296 scopus 로고    scopus 로고
    • J. Kohl and B. Neuman. The Kerberos Network Authentication Service Version 5. RFC-1510, 1991
    • J. Kohl and B. Neuman. The Kerberos Network Authentication Service Version 5. RFC-1510, 1991.
  • 31
    • 85027164480 scopus 로고    scopus 로고
    • th ACM Symposium on Principles of Distributed Computing, 1991.
    • th ACM Symposium on Principles of Distributed Computing, 1991.
  • 32
    • 0017930809 scopus 로고
    • A method for obtaining digitial signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digitial signatures and public key cryptosystems. Communication of the ACM, 1978.
    • (1978) Communication of the ACM
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.