메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 49-65

Strongly-resilient and non-interactive hierarchical key-agreement in MANETs

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE AD HOC NETWORKS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 57049153498     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_4     Document Type: Conference Paper
Times cited : (35)

References (19)
  • 1
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • Beth, T, Cot, N, Ingemarsson. I, eds, EUROCRYPT 1984, Springer, Heidelberg
    • Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson. I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335-338. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.209 , pp. 335-338
    • Blom, R.1
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing. SlAM
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SlAM. J. Computing 32(3), 586-615 (2003)
    • (2003) J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0036267543 scopus 로고    scopus 로고
    • A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
    • Hanaoka, G., Nishioka, T., Zheng, Y., Imai, H.: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3), 293-303 (2002)
    • (2002) Comput. J , vol.45 , Issue.3 , pp. 293-303
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 10
    • 84947242701 scopus 로고    scopus 로고
    • Towards Hierarchical Identity-Based Encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer. Heidelberg
    • Horwitz, J., Lynn. B.: Towards Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer. Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 12
    • 27744582346 scopus 로고    scopus 로고
    • Toward Hierarachical Identity-Based Cryptography for Tactical Networks
    • IEEE, Los Alamitos
    • Matt, B.: Toward Hierarachical Identity-Based Cryptography for Tactical Networks. In: Military Communications Conference. MILCOM 2004. pp. 727-735. IEEE, Los Alamitos (2004)
    • (2004) Military Communications Conference. MILCOM , pp. 727-735
    • Matt, B.1
  • 16
    • 47949101717 scopus 로고    scopus 로고
    • Balfe, S., Boklan, K.D., Klagsbrun, Z., Paterson, K.G.: Key Refreshing in Identity-based Cryptography and its Applications in MANET'S. In: Milcom (2007)
    • Balfe, S., Boklan, K.D., Klagsbrun, Z., Paterson, K.G.: Key Refreshing in Identity-based Cryptography and its Applications in MANET'S. In: Milcom (2007)
  • 17
    • 57049187162 scopus 로고    scopus 로고
    • NS-2: Open Source Network Simulator
    • NS-2: Open Source Network Simulator, http://www.isi.edu/nsnam/ns/
  • 18
    • 47949114698 scopus 로고    scopus 로고
    • Resource-Constrained Signal Propagation Modeling for Tactical
    • manuscript
    • Reidt, S., Ebinger, P., Wolthusen, S.D.: Resource-Constrained Signal Propagation Modeling for Tactical Networks (manuscript, 2006)
    • (2006) Networks
    • Reidt, S.1    Ebinger, P.2    Wolthusen, S.D.3
  • 19
    • 57049087538 scopus 로고    scopus 로고
    • A Compromise-Resilient Scheme for Pairwise Key Establishment in Dynamic Sensor Networks. In: Zhang, W., Tran, M., Zhu, S., Cao, G. (eds.) MobiHoc (2007)
    • A Compromise-Resilient Scheme for Pairwise Key Establishment in Dynamic Sensor Networks. In: Zhang, W., Tran, M., Zhu, S., Cao, G. (eds.) MobiHoc (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.