-
1
-
-
4544385042
-
An authenticated broadcasting scheme for wireless ad hoc network
-
Fredericton, Canada, pp
-
Bohio, M., Miri, A.: An authenticated broadcasting scheme for wireless ad hoc network. In: 2nd Annual Conference on Communication Networks and Services Research-CNSR 2004, Fredericton, Canada, pp. 69-74 (2004)
-
(2004)
2nd Annual Conference on Communication Networks and Services Research-CNSR
, pp. 69-74
-
-
Bohio, M.1
Miri, A.2
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
35248844436
-
-
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
-
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
-
-
-
-
4
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
Las Vegas, NV, USA, pp
-
Deng, H., Mukherjee, A., Agrawal, D.: Threshold and identity-based key management and authentication for wireless ad hoc networks. In: International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, pp. 107-111 (2004)
-
(2004)
International Conference on Information Technology: Coding and Computing
, pp. 107-111
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.3
-
5
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
-
Deng, H., Agrawal, D.P.: TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks 2(3), 291-307 (2004)
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
6
-
-
0003157491
-
On-line/off-ine digital signatures
-
Even, S., Goldreich, O., Micali, S.: On-line/off-ine digital signatures. Journal of Cryptology 9(1), 35-67 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
7
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
8
-
-
77649247458
-
On the generic construction of identity-based signatures with additional properties
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 178-193. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 178-193
-
-
Galindo, D.1
Herranz, J.2
Kiltz, E.3
-
9
-
-
33749318258
-
Identity based multisig-natures
-
Gangishetti, R., Gorantla, M.C., Das, M.L., Saxena, A.: Identity based multisig-natures. Informatica 17(2), 177-186 (2006)
-
(2006)
Informatica
, vol.17
, Issue.2
, pp. 177-186
-
-
Gangishetti, R.1
Gorantla, M.C.2
Das, M.L.3
Saxena, A.4
-
10
-
-
84947558992
-
A "Paradoxical" Identity-based signature scheme resulting from zero-knowledge
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
Guillou, L., Quisquater, J.J.: A "Paradoxical" Identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.J.2
-
11
-
-
38049003964
-
A survey of key management in ad hoc networks
-
Hegland, A.M., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials 8(3), 48-66 (2006)
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.3
, pp. 48-66
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
12
-
-
35248867510
-
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 310-324. Springer, Heidelberg (2003)
-
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310-324. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
33749603013
-
Key revocation for identity-based schemes in mobile ad hoc networks
-
Kunz, T, Ravi, S.S, eds, ADHOC-NOW 2006, Springer, Heidelberg
-
Hoeper, K., Gong, G.: Key revocation for identity-based schemes in mobile ad hoc networks. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol. 4104, pp. 224-237. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4104
, pp. 224-237
-
-
Hoeper, K.1
Gong, G.2
-
14
-
-
0020832088
-
A public-key cryptosystem suitable for digital multisig-natures
-
Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisig-natures. NEC Research and Development 71, 1-8 (1983)
-
(1983)
NEC Research and Development
, vol.71
, pp. 1-8
-
-
Itakura, K.1
Nakamura, K.2
-
15
-
-
0003597247
-
-
IETF INTERNET DRAFT, MANET working group, draft-ietf-manet-dsr-10.txt July
-
Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic source routing protocol for mobile ad hoc networks (DSR). IETF INTERNET DRAFT, MANET working group, draft-ietf-manet-dsr-10.txt (July 2004)
-
(2004)
The Dynamic source routing protocol for mobile ad hoc networks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.C.3
-
16
-
-
84943807207
-
Toward secure key distribution in truly ad hoc networks
-
Orlando, FL, USA, pp
-
Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad hoc networks. In: 2003 Symposium on Applications and the Internet Workshops, Orlando, FL, USA, pp. 342-364 (2003)
-
(2003)
2003 Symposium on Applications and the Internet Workshops
, pp. 342-364
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
17
-
-
26844533458
-
-
Li, G., Han, W.: A new scheme for key management in ad hoc networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, 3421, pp. 242-249. Springer, Heidelberg (2005)
-
Li, G., Han, W.: A new scheme for key management in ad hoc networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3421, pp. 242-249. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
38049045124
-
-
Li, F., Hu, Y., Zhang, C: An identity-based signcryption scheme for multi-domain ad hoc networks. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 373-384. Springer, Heidelberg (2007)
-
Li, F., Hu, Y., Zhang, C: An identity-based signcryption scheme for multi-domain ad hoc networks. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 373-384. Springer, Heidelberg (2007)
-
-
-
-
19
-
-
0035747565
-
Accountable-subgroup multisignatures
-
Philadelphia, USA, pp
-
Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures. In: 8th ACM Conference on Computer and Communications Security-CCS 2001, Philadelphia, USA, pp. 245-254 (2001)
-
(2001)
8th ACM Conference on Computer and Communications Security-CCS
, pp. 245-254
-
-
Micali, S.1
Ohta, K.2
Reyzin, L.3
-
20
-
-
13944275248
-
ISSRP: A secure routing protocol using identity-based signcryption scheme in ad-hoc networks
-
Liew, K.-M, Shen, H, See, S, Cai, W, eds, PDCAT 2004, Springer, Heidelberg
-
Park, B.N., Myung, J., Lee, W.: ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks. In: Liew, K.-M., Shen, H., See, S., Cai, W. (eds.) PDCAT 2004. LNCS, vol. 3320, pp. 711-714. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3320
, pp. 711-714
-
-
Park, B.N.1
Myung, J.2
Lee, W.3
-
21
-
-
25844478002
-
ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
-
Park, B.N., Lee, W.: ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks. IEICE Transactions on Communications E88-B(6), 2548-2556 (2005)
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.6
, pp. 2548-2556
-
-
Park, B.N.1
Lee, W.2
-
22
-
-
58449130004
-
-
Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. IETF INTERNET DRAFT, MANET working group, Draft-ietf-manet-aodv- 13.txt (February 2003)
-
Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. IETF INTERNET DRAFT, MANET working group, Draft-ietf-manet-aodv- 13.txt (February 2003)
-
-
-
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
33744918078
-
-
Xu, S., Mu, Y., Susilo, W.: Efficient authentication scheme for routing in mobile ad hoc networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T.(eds.) EUC-WS 2005. LNCS, 3823, pp. 854-863. Springer, Heidelberg (2005)
-
Xu, S., Mu, Y., Susilo, W.: Efficient authentication scheme for routing in mobile ad hoc networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T.(eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 854-863. Springer, Heidelberg (2005)
-
-
-
-
25
-
-
33746327817
-
-
Xu, S., Mu, Y., Susilo, W.: Online/offline signatures and multisignatures for AODV and DSR routing security. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 99-110. Springer, Heidelberg (2006)
-
Xu, S., Mu, Y., Susilo, W.: Online/offline signatures and multisignatures for AODV and DSR routing security. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 99-110. Springer, Heidelberg (2006)
-
-
-
|