-
1
-
-
0033357103
-
Securing Ad hoc Networks
-
L.Zhou, Z.J.Hass: Securing Ad hoc Networks. IEEE Networks, vol. 13(1999) 24-30
-
(1999)
IEEE Networks
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Hass, Z.J.2
-
2
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks
-
Network Protocols2001
-
J.Kong, P.Zerfos, H.Luo, S.Lu, L.Zhang: Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks. Proc.IEEE Int'l Conf. Network Protocols(2001)
-
Proc.IEEE Int'l Conf
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
3
-
-
84943517115
-
On the Unitility Distributed Cryptography in P2P and Manets: The Case of Membership Control
-
Netwok Protocols2003
-
M.Narasimha,G. Tsudik, J.H.Yi: On the Unitility Distributed Cryptography in P2P and Manets: The Case of Membership Control. Proc. IEEE Int'l Conf. Netwok Protocols(2003)
-
Proc. IEEE Int'l Conf
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
4
-
-
11244320485
-
URSA: Ubiquitous and Robust Access Control for Mobile Ad hoc Networks
-
H.Luo,J.Kong, P.Zerfos, S.Lu, L.Zhang: URSA: Ubiquitous and Robust Access Control for Mobile Ad hoc Networks. IEEE/ACM Trans. Networking, Vol.12,no.6(2004) 1049-1063
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
5
-
-
16244372424
-
-
K-H Rhee, Y-h Park, G.Tsudik.: A group key management architecture for mobile ad-hoc wireless networks. journal of information science and engineering 21(2005) 415-428
-
K-H Rhee, Y-h Park, G.Tsudik.: A group key management architecture for mobile ad-hoc wireless networks. journal of information science and engineering 21(2005) 415-428
-
-
-
-
6
-
-
34547743395
-
A hierarchical key management scheme for secure group communications in mobile Ad hoc networks
-
Wang, N.-C.: A hierarchical key management scheme for secure group communications in mobile Ad hoc networks. The Journal of Systems and Software, 80(10) (2007) 1667-1677
-
(2007)
The Journal of Systems and Software
, vol.80
, Issue.10
, pp. 1667-1677
-
-
Wang, N.-C.1
-
7
-
-
43149092240
-
An efficient heterogeneous key management approach for secure multicast communications in Ad hoc networks
-
N.Kettaf, H.Abouaissa, P.Lorenz: An efficient heterogeneous key management approach for secure multicast communications in Ad hoc networks, Telecommun Syst(2008) 29-36
-
(2008)
Telecommun Syst
, pp. 29-36
-
-
Kettaf, N.1
Abouaissa, H.2
Lorenz, P.3
-
9
-
-
63149088120
-
-
A.Fiat, A.Shamir: How to Prove Yourself: practical Solutions to Identification and Signature Problems. Advances in Cryptology - Crypto'86, LNCS 0263, Springer(1986) 186-194.
-
A.Fiat, A.Shamir: How to Prove Yourself: practical Solutions to Identification and Signature Problems. Advances in Cryptology - Crypto'86, LNCS 0263, Springer(1986) 186-194.
-
-
-
-
10
-
-
84947558992
-
A "Paradoxical" identitybased Signature Scheme Resulting From Zero-Knowledge
-
Advances in Cryptology, Crypto'88, Springer
-
L.Guilou, J-J. Quisquater: A "Paradoxical" identitybased Signature Scheme Resulting From Zero-Knowledge. Advances in Cryptology - Crypto'88, LNCS 0403, Springer (1988) 216-231
-
(1988)
LNCS
, vol.403
, pp. 216-231
-
-
Guilou, L.1
Quisquater, J.-J.2
-
11
-
-
84874324906
-
Identity-based Encryption from the Weil Pairing
-
D. Boneh and M.Franklin: Identity-based Encryption from the Weil Pairing. Proc CRYPTO'01(2001) 213-229.
-
(2001)
Proc CRYPTO'01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
0037623983
-
Identity-based Encryption from the Weil Pairing
-
D. Boneh and M.Franklin: Identity-based Encryption from the Weil Pairing. SIAMJ. Computing, vol. 32, no. 3(2003) 586-615.
-
(2003)
SIAMJ. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
35248867510
-
Efficient Identity based Signature Schemes Based on Pairings
-
F. Hess: Efficient Identity based Signature Schemes Based on Pairings. Proc. of SAC 2002, LNCS 2595, Springer -Verlag (2002) 310-324.
-
(2002)
Proc. of SAC 2002, LNCS 2595, Springer -Verlag
, pp. 310-324
-
-
Hess, F.1
-
16
-
-
63149119609
-
Efficient identity-base encryption without random oracles[R]. Cryptology ePrint Archive
-
Report 2004/180
-
WATERS B R: Efficient identity-base encryption without random oracles[R]. Cryptology ePrint Archive, Report 2004/180, http://epring.iacr.org (2004).
-
(2004)
-
-
WATERS, B.R.1
-
17
-
-
36048992805
-
Identity-based ring signatures from RSA
-
Javier Herranz: Identity-based ring signatures from RSA. Theoretical Computer Science 389(2007) 100-117.
-
(2007)
Theoretical Computer Science
, vol.389
, pp. 100-117
-
-
Javier Herranz1
-
18
-
-
33751255669
-
Identity-based secure collaboration in wireless Ad hoc networks
-
J.Pan, L.Cai, X.Shen, J.W.Mark: Identity-based secure collaboration in wireless Ad hoc networks. Computer Network 51(3) (2007) 853-865.
-
(2007)
Computer Network
, vol.51
, Issue.3
, pp. 853-865
-
-
Pan, J.1
Cai, L.2
Shen, X.3
Mark, J.W.4
-
19
-
-
0018545449
-
-
Shamir.A: How to share a secret. Communications of the ACM 22 no.11 (1979) 612-613.
-
Shamir.A: How to share a secret. Communications of the ACM vol.22 no.11 (1979) 612-613.
-
-
-
-
20
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
G.Frey, M.Muller, H.riick: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Tran. On Info. Th., Vol. 45(1999) 1717-1718.
-
(1999)
IEEE Tran. On Info. Th
, vol.45
, pp. 1717-1718
-
-
Frey, G.1
Muller, M.2
riick, H.3
-
21
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A.Menezes, T.Okamoto, S.VanstoneL: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Tran. On Info. Th., Vol.39 (1993) 1639-1646.
-
(1993)
IEEE Tran. On Info. Th
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
VanstoneL, S.3
-
22
-
-
33144480885
-
Arce: Securing reliable server pooling in MANET against Byzantine adversaries
-
February
-
Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce: Securing reliable server pooling in MANET against Byzantine adversaries. IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February (2006) 357-369.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 357-369
-
-
Di Crescenzo, G.1
Ge, R.2
Gonzalo, R.3
-
23
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless Ad hoc networks
-
Hongmei Deng, D.P.Agrawal: TIDS: threshold and identity-based security scheme for wireless Ad hoc networks. Ad hoc Networks 2(2004) 291-307.
-
(2004)
Ad hoc Networks
, vol.2
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
24
-
-
84982943258
-
-
T.Pedersen: Non-interactive and informationtheorectic secure verifiable secret sharing. In J. Feigenbaum, editor, Afvances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CA USA, August 11-15,1991, Proceedings, 576 of Lecture Notes in Computer Science, Springer(1992) 129-140
-
T.Pedersen: Non-interactive and informationtheorectic secure verifiable secret sharing. In J. Feigenbaum, editor, Afvances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CA USA, August 11-15,1991, Proceedings, Volume 576 of Lecture Notes in Computer Science, Springer(1992) 129-140
-
-
-
|