메뉴 건너뛰기




Volumn 2, Issue 3, 2004, Pages 309-317

Efficient identity-based security schemes for ad hoc network routing protocols

Author keywords

Ad hoc network security; Authenticated broadcast schemes; Identity based symmetric keys

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; DATA ACQUISITION; QUALITY OF SERVICE; ROUTERS; SECURITY OF DATA;

EID: 7744225358     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2004.03.011     Document Type: Article
Times cited : (30)

References (22)
  • 2
    • 0012970453 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing, extended abstract
    • Advances in Cryptology - Crypto 2001, Berlin: Springer
    • Boneh D., Franklin M. Identity-based encryption from the Weil pairing, extended abstract. Advances in Cryptology - Crypto 2001. Lecture Notes in Computer Science. vol. 2139:2001;229-231 Springer, Berlin.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 229-231
    • Boneh, D.1    Franklin, M.2
  • 8
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • Advances in Cryptology - Crypto '84, Berlin: Springer
    • Shamir A. Identity based cryptosystems and signature schemes. Advances in Cryptology - Crypto '84. Lecture Notes in Computer Science. vol. 196:1984;47-53 Springer, Berlin.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 9
    • 0024664858 scopus 로고
    • An ID-based cryptosystem based on the discrete logarithm problem
    • Tsuji S., Itoh T. An ID-based cryptosystem based on the discrete logarithm problem. IEEE Journal on Selected Areas in Communication. 7:(4):1989;467-473.
    • (1989) IEEE Journal on Selected Areas in Communication , vol.7 , Issue.4 , pp. 467-473
    • Tsuji, S.1    Itoh, T.2
  • 10
    • 85032215902 scopus 로고
    • A realization scheme for identity-based cryptosystems
    • Advances in Cryptology - Crypto '87, Berlin: Springer
    • Tanaka H. A realization scheme for identity-based cryptosystems. Advances in Cryptology - Crypto '87. Lecture Notes in Computer Science. vol. 293:1987;341-349 Springer, Berlin.
    • (1987) Lecture Notes in Computer Science , vol.293 , pp. 341-349
    • Tanaka, H.1
  • 11
    • 84943807207 scopus 로고    scopus 로고
    • Toward secure key distribution in truly ad hoc networks
    • in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, January 28
    • A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad hoc networks, in: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, January 28, 2003.
    • (2003) Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks
    • Khalili, A.1    Katz, J.2    Arbaugh, W.A.3
  • 14
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • University of Massachusetts, August
    • B. Dahill, B. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Technical report UM-CS-2001-037, University of Massachusetts, August 2001.
    • (2001) Technical Report , vol.UM-CS-2001-037
    • Dahill, B.1    Levine, B.2    Royer, E.3    Shields, C.4
  • 15
    • 84961346572 scopus 로고    scopus 로고
    • Accelerating key establishment protocols for mobile communication
    • Information Security and Privacy, Proceedings of the 4th Australian Conference (ACISP' 99), April 1999, Springer, Berlin
    • S. Lee, S.-M. Hong, H. Yoon, Y. Cho, Accelerating key establishment protocols for mobile communication, in: Information Security and Privacy, Proceedings of the 4th Australian Conference (ACISP' 99), pp. 51-63, April 1999, Lecture Notes in Computer Science, vol. 1587, Springer, Berlin, 1999, pp. 51-63.
    • (1999) Lecture Notes in Computer Science , vol.1587 , pp. 51-63
    • Lee, S.1    Hong, S.-M.2    Yoon, H.3    Cho, Y.4
  • 16
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • Carleson U. Optimal privacy and authentication on a portable communications system. ACM Operating Systems Review. 28:(3):1994;16-23.
    • (1994) ACM Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carleson, U.1
  • 17
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • Information Security and Privacy, Proceedings of the 3rd Australian Conference (ACISP' 98), Springer, Berlin
    • C. Boyd, A. Mathuria, Key establishment protocols for secure mobile communications: a selective survey, in: Information Security and Privacy, Proceedings of the 3rd Australian Conference (ACISP' 98), Lecture Notes in Computer Science, vol. 1438, Springer, Berlin, 1998, pp. 344-355.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 18
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • Aziz A., Diffie W. Privacy and authentication for wireless local area networks. IEEE Personal Communications. 1:(1):1994;25-31.
    • (1994) IEEE Personal Communications , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 22
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., Hass Z. Securing ad hoc networks. IEEE Network. 13:(6):1999;24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Hass, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.