메뉴 건너뛰기




Volumn , Issue , 2009, Pages 274-284

Ad-hoc on demand authentication chain protocol: An authentication protocol for ad-hoc networks

Author keywords

Authentication; Key establishment; Man in the middle attack; Mobile ad hoc networks; Transitive authentication

Indexed keywords

ACTIVE ATTACK; AUTHENTICATED KEY ESTABLISHMENTS; AUTHENTICATION PROTOCOLS; AUTHENTICATION TECHNIQUES; AUTONOMOUS SYSTEMS; CONSTRAINED DEVICES; DYNAMIC TOPOLOGIES; GNY LOGIC; KEY ESTABLISHMENT; KEY ESTABLISHMENTS; MAN IN THE MIDDLE ATTACKS; MOBILE NODES; NETWORK NODE; ON-DEMAND; PEER-TO-PEER COMMUNICATIONS; PERFORMANCE ANALYSIS; SECRET KEY; SECURITY OBJECTIVES; SECURITY PROPERTIES; SPECIAL PROPERTIES; TRUSTED AUTHORITIES;

EID: 74549141479     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, 13, pp. 24-30, 1999.
    • Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, pp. 24-30, 1999.
  • 3
    • 1842643245 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • presented at
    • J. Kong, P. Zerfos, S. L. H. Luo, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad hoc networks," presented at IEEE ICNP, 2001.
    • (2001) IEEE ICNP
    • Kong, J.1    Zerfos, P.2    Luo, S.L.H.3    Zhang, L.4
  • 4
    • 24144501183 scopus 로고    scopus 로고
    • On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
    • presented at
    • Narasimha, G. Tsudik, and J. H. Yi, "On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control," presented at IEEE ICNP, 2003.
    • (2003) IEEE ICNP
    • Narasimha, G.T.1    Yi, J.H.2
  • 5
    • 84883869163 scopus 로고    scopus 로고
    • H. Luo, P. Zerfos, J. Kong, and L. Z. S. Lu, Self-securing Ad Hoc Wireless Networks, presented at ISCC, 2002.
    • H. Luo, P. Zerfos, J. Kong, and L. Z. S. Lu, "Self-securing Ad Hoc Wireless Networks," presented at ISCC, 2002.
  • 6
    • 74549202373 scopus 로고    scopus 로고
    • Local Broadcast and Transitive Authentication Based Key Establishment Scheme for Wireless Ad-hoc Network
    • June
    • A. M. Hamad, T. I. El-Areef, M. A. Shouman, and W. I. Khedr, "Local Broadcast and Transitive Authentication Based Key Establishment Scheme for Wireless Ad-hoc Network," the Egyptian Informatics Journal,, June 2008a.
    • (2008) the Egyptian Informatics Journal
    • Hamad, A.M.1    El-Areef, T.I.2    Shouman, M.A.3    Khedr, W.I.4
  • 8
    • 84867997005 scopus 로고    scopus 로고
    • A fast algorithm for the maximum clique problem
    • P. R. J. Östergård, "A fast algorithm for the maximum clique problem," Discrete Applied Mathematics vol. 120, pp. 197-207, 2002.
    • (2002) Discrete Applied Mathematics , vol.120 , pp. 197-207
    • Östergård, P.R.J.1
  • 10
    • 0025023289 scopus 로고
    • Reasoning about Belief in Cryptographic Protocols
    • presented at, Oakland, CA, USA
    • Gong, R. Needham, and R. Yahalom, "Reasoning about Belief in Cryptographic Protocols," presented at IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1990.
    • (1990) IEEE Symposium on Security and Privacy
    • Gong, R.N.1    Yahalom, R.2
  • 12
    • 74549175407 scopus 로고    scopus 로고
    • Silva, W. P., and C. M. D. P. S. Silva, LAB Fit Curve Fitting Software (Nonlinear Regression and Treatment of Data Program) V 7.2.39 (1999-2007), online, available from world wide web: http://www.angelfire.com/ rnb/labfit/.
    • Silva, W. P., and C. M. D. P. S. Silva, "LAB Fit Curve Fitting Software (Nonlinear Regression and Treatment of Data Program) V 7.2.39 (1999-2007), online, available from world wide web: http://www.angelfire.com/ rnb/labfit/."


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.