메뉴 건너뛰기




Volumn 5, Issue 1, 2010, Pages 35-44

Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks

Author keywords

Ad hoc network; Anonymous DSR; Bloom filter; Pseudonym

Indexed keywords

AD HOC NETWORKS; DATA STRUCTURES; INTERNET PROTOCOLS; NETWORK ROUTING; ROUTING PROTOCOLS;

EID: 77949835881     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2010.030721     Document Type: Article
Times cited : (16)

References (21)
  • 1
    • 0014814325 scopus 로고
    • Space or time tradeoffs in hash coding with allowable error
    • Bloom, B. (1970) 'Space or time tradeoffs in hash coding with allowable error', Communications of the ACM, Vol. 13, No. 7, pp.422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 2
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • Broder, A. and Mitzen, M. (2005) 'Network applications of bloom filters: a survey', Internet Mathematics, Vol. 1, No. 4, pp.485-509.
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzen, M.2
  • 3
    • 0022145479 scopus 로고
    • Security without identification transaction systems to make big brother obsolete
    • Chaum, D. (1985) 'Security without identification transaction systems to make big brother obsolete', Communication of the ACM, Vol. 28, No. 10, pp.1030-1044.
    • (1985) Communication of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 4
    • 77949784096 scopus 로고    scopus 로고
    • A secure anonymous on demand routing protocol in ad hoc
    • Chen, J., Cui, G., Hong, L. and Fu, C. (2007a) 'A secure anonymous on demand routing protocol in ad hoc', Computer Science, Vol. 34, No. 1, pp.29-33.
    • (2007) Computer Science , vol.34 , Issue.1 , pp. 29-33
    • Chen, J.1    Cui, G.2    Hong, L.3    Fu, C.4
  • 5
    • 77949819659 scopus 로고    scopus 로고
    • Pseudonymbased signature scheme for anonymous communication in wireless ad hoc networks
    • Chen, S., Xu, L. and Chen, Z. (2007b) 'Pseudonymbased signature scheme for anonymous communication in wireless ad hoc networks', Journal of Computer Applications, Vol. 27, No. 11, pp.2707-2709.
    • (2007) Journal of Computer Applications , vol.27 , Issue.11 , pp. 2707-2709
    • Chen, S.1    Xu, L.2    Chen, Z.3
  • 7
    • 54249155201 scopus 로고    scopus 로고
    • Identity-based online/offline encryption, financial cryptography and data security (FC'08)
    • Springer-Verlag, Cozumel, Mexico
    • Guo, F., Mu, Y. and Chen, Z. (2008) 'Identity-based online/offline encryption, financial cryptography and data security (FC'08)', Lecture Notes in Computer Science, Springer-Verlag, Cozumel, Mexico, pp.247-261.
    • (2008) Lecture Notes in Computer Science , pp. 247-261
    • Guo, F.1    Mu, Y.2    Chen, Z.3
  • 8
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Springer- Verlag, London, UK
    • Hess, F. (2003) 'Efficient identity based signature schemes based on pairings', Proceedings of SAC'02, Springer- Verlag, London, UK, pp.310-324.
    • (2003) Proceedings of SAC'02 , pp. 310-324
    • Hess, F.1
  • 9
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communication in mobile ad-hoc networks
    • Huang, D.J. (2007) 'Pseudonym-based cryptography for anonymous communication in mobile ad-hoc networks', Special Issue on Cryptography in Networks, Int. J. Security and Networks, Vol. 2, Nos. 3-4, pp.272-283.
    • (2007) Special Issue on Cryptography in Networks, Int. J. Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.J.1
  • 10
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Chapter 5, Kluwer Academic Publishers, Norwell, MA
    • Johnson, D.L. and Maltz, D. (1996) 'Dynamic source routing in ad hoc wireless networks', Mobile Computing, Chapter 5, Kluwer Academic Publishers, Norwell, MA, pp.153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.L.1    Maltz, D.2
  • 14
    • 33847698965 scopus 로고    scopus 로고
    • Efficient pairing computation on super singular abelian varieties
    • Kluwer Academic Publishers, Norwell, MA, USA
    • Paulo, S.L., Barreto, M., Steven, G., O'Heigeartaiqh, C. and Scott, M. (2007) 'Efficient pairing computation on super singular abelian varieties', Designs, Codes and Cryptography, Kluwer Academic Publishers, Vol. 42, No. 3, Norwell, MA, USA, pp.239-271.
    • (2007) Designs, Codes and Cryptography , vol.42 , Issue.3 , pp. 239-271
    • Paulo, S.L.1    Barreto, M.2    Steven, G.3    O'Heigeartaiqh, C.4    Scott, M.5
  • 16
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature scheme
    • LNCS 196, Springer-Verlag, Santa Barbara, CA, USA
    • Shamir, A. (1984) 'Identity-based cryptosystems and signature scheme', Advance in Cryptology CRYPTO'84, LNCS 196, Springer-Verlag, Santa Barbara, CA, USA, pp.47-53.
    • (1984) Advance in Cryptology CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 19
    • 34248553603 scopus 로고    scopus 로고
    • A heuristic fault-tolerant routing algorithm in mesh using rectilinear-monotone polygonal fault blocks
    • Wang, D. (2007) 'A heuristic fault-tolerant routing algorithm in mesh using rectilinear-monotone polygonal fault blocks', Journal of Systems Architecture, Vol. 53, No. 9, pp.619-628.
    • (2007) Journal of Systems Architecture , vol.53 , Issue.9 , pp. 619-628
    • Wang, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.