메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 797-801

Identity-based threshold key management for Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

IDENTITY-BASED; KEY DISTRIBUTIONS; KEY GENERATIONS; KEY MANAGEMENTS; MOBILE NODES; SECRET SHARING; SECURITY PROBLEMS; VARIOUS ATTACKS;

EID: 63149177861     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PACIIA.2008.211     Document Type: Conference Paper
Times cited : (11)

References (24)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad hoc Networks
    • L.Zhou, Z.J.Hass: Securing Ad hoc Networks. IEEE Networks, vol. 13(1999) 24-30
    • (1999) IEEE Networks , vol.13 , pp. 24-30
    • Zhou, L.1    Hass, Z.J.2
  • 2
    • 0035704362 scopus 로고    scopus 로고
    • Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks
    • Network Protocols2001
    • J.Kong, P.Zerfos, H.Luo, S.Lu, L.Zhang: Providing Robust and Ubiquitous Security Support for Mobile Ad hoc Networks. Proc.IEEE Int'l Conf. Network Protocols(2001)
    • Proc.IEEE Int'l Conf
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 3
    • 84943517115 scopus 로고    scopus 로고
    • On the Unitility Distributed Cryptography in P2P and Manets: The Case of Membership Control
    • Netwok Protocols2003
    • M.Narasimha,G. Tsudik, J.H.Yi: On the Unitility Distributed Cryptography in P2P and Manets: The Case of Membership Control. Proc. IEEE Int'l Conf. Netwok Protocols(2003)
    • Proc. IEEE Int'l Conf
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 4
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and Robust Access Control for Mobile Ad hoc Networks
    • H.Luo,J.Kong, P.Zerfos, S.Lu, L.Zhang: URSA: Ubiquitous and Robust Access Control for Mobile Ad hoc Networks. IEEE/ACM Trans. Networking, Vol.12,no.6(2004) 1049-1063
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 5
    • 16244372424 scopus 로고    scopus 로고
    • K-H Rhee, Y-h Park, G.Tsudik.: A group key management architecture for mobile ad-hoc wireless networks. journal of information science and engineering 21(2005) 415-428
    • K-H Rhee, Y-h Park, G.Tsudik.: A group key management architecture for mobile ad-hoc wireless networks. journal of information science and engineering 21(2005) 415-428
  • 6
    • 34547743395 scopus 로고    scopus 로고
    • A hierarchical key management scheme for secure group communications in mobile Ad hoc networks
    • Wang, N.-C.: A hierarchical key management scheme for secure group communications in mobile Ad hoc networks. The Journal of Systems and Software, 80(10) (2007) 1667-1677
    • (2007) The Journal of Systems and Software , vol.80 , Issue.10 , pp. 1667-1677
    • Wang, N.-C.1
  • 7
    • 43149092240 scopus 로고    scopus 로고
    • An efficient heterogeneous key management approach for secure multicast communications in Ad hoc networks
    • N.Kettaf, H.Abouaissa, P.Lorenz: An efficient heterogeneous key management approach for secure multicast communications in Ad hoc networks, Telecommun Syst(2008) 29-36
    • (2008) Telecommun Syst , pp. 29-36
    • Kettaf, N.1    Abouaissa, H.2    Lorenz, P.3
  • 9
    • 63149088120 scopus 로고    scopus 로고
    • A.Fiat, A.Shamir: How to Prove Yourself: practical Solutions to Identification and Signature Problems. Advances in Cryptology - Crypto'86, LNCS 0263, Springer(1986) 186-194.
    • A.Fiat, A.Shamir: How to Prove Yourself: practical Solutions to Identification and Signature Problems. Advances in Cryptology - Crypto'86, LNCS 0263, Springer(1986) 186-194.
  • 10
    • 84947558992 scopus 로고
    • A "Paradoxical" identitybased Signature Scheme Resulting From Zero-Knowledge
    • Advances in Cryptology, Crypto'88, Springer
    • L.Guilou, J-J. Quisquater: A "Paradoxical" identitybased Signature Scheme Resulting From Zero-Knowledge. Advances in Cryptology - Crypto'88, LNCS 0403, Springer (1988) 216-231
    • (1988) LNCS , vol.403 , pp. 216-231
    • Guilou, L.1    Quisquater, J.-J.2
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • D. Boneh and M.Franklin: Identity-based Encryption from the Weil Pairing. Proc CRYPTO'01(2001) 213-229.
    • (2001) Proc CRYPTO'01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 12
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • D. Boneh and M.Franklin: Identity-based Encryption from the Weil Pairing. SIAMJ. Computing, vol. 32, no. 3(2003) 586-615.
    • (2003) SIAMJ. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 15
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity based Signature Schemes Based on Pairings
    • F. Hess: Efficient Identity based Signature Schemes Based on Pairings. Proc. of SAC 2002, LNCS 2595, Springer -Verlag (2002) 310-324.
    • (2002) Proc. of SAC 2002, LNCS 2595, Springer -Verlag , pp. 310-324
    • Hess, F.1
  • 16
    • 63149119609 scopus 로고    scopus 로고
    • Efficient identity-base encryption without random oracles[R]. Cryptology ePrint Archive
    • Report 2004/180
    • WATERS B R: Efficient identity-base encryption without random oracles[R]. Cryptology ePrint Archive, Report 2004/180, http://epring.iacr.org (2004).
    • (2004)
    • WATERS, B.R.1
  • 17
    • 36048992805 scopus 로고    scopus 로고
    • Identity-based ring signatures from RSA
    • Javier Herranz: Identity-based ring signatures from RSA. Theoretical Computer Science 389(2007) 100-117.
    • (2007) Theoretical Computer Science , vol.389 , pp. 100-117
    • Javier Herranz1
  • 18
    • 33751255669 scopus 로고    scopus 로고
    • Identity-based secure collaboration in wireless Ad hoc networks
    • J.Pan, L.Cai, X.Shen, J.W.Mark: Identity-based secure collaboration in wireless Ad hoc networks. Computer Network 51(3) (2007) 853-865.
    • (2007) Computer Network , vol.51 , Issue.3 , pp. 853-865
    • Pan, J.1    Cai, L.2    Shen, X.3    Mark, J.W.4
  • 19
    • 0018545449 scopus 로고    scopus 로고
    • Shamir.A: How to share a secret. Communications of the ACM 22 no.11 (1979) 612-613.
    • Shamir.A: How to share a secret. Communications of the ACM vol.22 no.11 (1979) 612-613.
  • 20
    • 0032649638 scopus 로고    scopus 로고
    • The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • G.Frey, M.Muller, H.riick: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Tran. On Info. Th., Vol. 45(1999) 1717-1718.
    • (1999) IEEE Tran. On Info. Th , vol.45 , pp. 1717-1718
    • Frey, G.1    Muller, M.2    riick, H.3
  • 21
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A.Menezes, T.Okamoto, S.VanstoneL: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Tran. On Info. Th., Vol.39 (1993) 1639-1646.
    • (1993) IEEE Tran. On Info. Th , vol.39 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    VanstoneL, S.3
  • 22
    • 33144480885 scopus 로고    scopus 로고
    • Arce: Securing reliable server pooling in MANET against Byzantine adversaries
    • February
    • Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce: Securing reliable server pooling in MANET against Byzantine adversaries. IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February (2006) 357-369.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 357-369
    • Di Crescenzo, G.1    Ge, R.2    Gonzalo, R.3
  • 23
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: Threshold and identity-based security scheme for wireless Ad hoc networks
    • Hongmei Deng, D.P.Agrawal: TIDS: threshold and identity-based security scheme for wireless Ad hoc networks. Ad hoc Networks 2(2004) 291-307.
    • (2004) Ad hoc Networks , vol.2 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 24
    • 84982943258 scopus 로고    scopus 로고
    • T.Pedersen: Non-interactive and informationtheorectic secure verifiable secret sharing. In J. Feigenbaum, editor, Afvances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CA USA, August 11-15,1991, Proceedings, 576 of Lecture Notes in Computer Science, Springer(1992) 129-140
    • T.Pedersen: Non-interactive and informationtheorectic secure verifiable secret sharing. In J. Feigenbaum, editor, Afvances in Cryptology-Crypto'91, the 11th Annual International Cryptology Conference, Santa Barbara, CA USA, August 11-15,1991, Proceedings, Volume 576 of Lecture Notes in Computer Science, Springer(1992) 129-140


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.