메뉴 건너뛰기




Volumn , Issue , 2008, Pages 193-202

A body-centered cubic method for key agreement in dynamic mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; CONTINUOUS FLOWS; DYNAMIC CHANGING TOPOLOGIES; ELLIPTIC CURVE CRYPTOGRAPHIES; KEY AGREEMENTS; MOBILE AD HOC NETWORKINGS; MOBILE AD HOC NETWORKS; MOBILE HOSTS; NETWORK CONNECTIVITIES; OPERATING MODES; PROCESSING POWERS; THIN CLIENTS;

EID: 55849117389     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.42     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 4
  • 5
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, volume 4 8, 203-209, 1987.
    • (1987) Mathematics of Computation , vol.4 , Issue.8 , pp. 203-209
    • Koblitz, N.1
  • 6
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): 120-126, Feb 1978.
    • R. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2): 120-126, Feb 1978.
  • 8
    • 35048833769 scopus 로고    scopus 로고
    • A. Menezes, E. Teske, and A. Weng. Weak Fields for ECC. In T. Okamoto, editor, Topics in Cryptology CTRSA 2004, LNCS 2964, pages 366{386. Springer, 2004.
    • A. Menezes, E. Teske, and A. Weng. Weak Fields for ECC. In T. Okamoto, editor, Topics in Cryptology CTRSA 2004, volume LNCS 2964, pages 366{386. Springer, 2004.
  • 9
    • 55849100263 scopus 로고    scopus 로고
    • D. Johnson and S. Vanstone, The elliptic curve digital signature algorithm (ECDSA) (with D. Johnson and S. Vanstone) International Journal on Information Security, 1:36-63, 2001.
    • D. Johnson and S. Vanstone, The elliptic curve digital signature algorithm (ECDSA) (with D. Johnson and S. Vanstone) International Journal on Information Security, 1:36-63, 2001.
  • 11
    • 0036867644 scopus 로고    scopus 로고
    • Dong Zheng, Kefei Chen, Jinyuan You, Multiparty authentication services and key agreement protocols with semi-trusted third party, Journal of Computer Science and Technology archive, 17, Issue 6 (November 2002) table of contents Pages: 749- 756, 2002
    • Dong Zheng, Kefei Chen, Jinyuan You, Multiparty authentication services and key agreement protocols with semi-trusted third party, Journal of Computer Science and Technology archive, Volume 17, Issue 6 (November 2002) table of contents Pages: 749- 756, 2002
  • 16
    • 34247603985 scopus 로고    scopus 로고
    • Lijun Liao and Mark Manulis, Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. Future Generation Computer Systems (FGCS), 23(6):787-803, 2007, Elsevier
    • Lijun Liao and Mark Manulis, Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks. Future Generation Computer Systems (FGCS), 23(6):787-803, 2007, Elsevier


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.