메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 275-280

Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)

Author keywords

Certificate revocation; Flooding; Mobile ad hoc network (MANET); Performance evaluation; Public key infrastructure

Indexed keywords

CERTIFICATE AUTHORITY; CERTIFICATE REVOCATION; CERTIFICATE REVOCATION LIST; COMMUNICATION LINKS; CRITICAL FACTORS; DISTRIBUTION PROBLEM; NODE MOBILITY; PERFORMANCE EVALUATION; PUBLIC KEY INFRASTRUCTURE; REALISTIC MODEL; SIMULATION RESULT; SIMULATION-BASED; WIRED NETWORKS;

EID: 77953780152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1167253.1167271     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 4
    • 4544374484 scopus 로고    scopus 로고
    • A certificate revocation scheme for wireless ad hoc networks
    • C. Crepeau and C. R. Davis. A Certificate Revocation Scheme for Wireless Ad Hoc Networks. In Proceedings of SASN'03, p.54-61, 2003.
    • (2003) Proceedings of SASN'03 , pp. 54-61
    • Crepeau, C.1    Davis, C.R.2
  • 6
    • 0005362390 scopus 로고    scopus 로고
    • Standard Edition, v.1.4.2 (J2SE)
    • Java 2 Platform, Standard Edition, v.1.4.2 (J2SE).
    • Java 2 Platform
  • 7
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • P. C. Kocher. On Certificate Revocation and Validation. In Proceedings of FC'98, p.172-177, 1998.
    • (1998) Proceedings of FC'98 , pp. 172-177
    • Kocher, P.C.1
  • 8
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of ICNP'01, p.251-260, 2001.
    • (2001) Proceedings of ICNP'01 , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 12
    • 84943517115 scopus 로고    scopus 로고
    • On the utility of distributed cryptography in P2P and MANETs: The case of membership control
    • M. Narasimha, G. Tsudik, and J. H. Yi. On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control. In Proceedings of ICNP'03, p.336-345, 2003.
    • (2003) Proceedings of ICNP'03 , pp. 336-345
    • Narasimha, M.1    Tsudik, G.2    Yi, J.H.3
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining Digital signatures, and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining Digital Signatures, and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22(11): 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0011255177 scopus 로고    scopus 로고
    • X.509 internet public key infrastructure certificate and certificate revocation list (CRL) profile
    • April
    • X.509 Internet Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3208, April 2002.
    • (2002) RFC 3208
  • 17
    • 0003344055 scopus 로고    scopus 로고
    • X.509 internet public key infrastructure online certificate status protocol - OCSP
    • June, 99
    • X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560, June, 99.
    • RFC 2560
  • 18
    • 17144398990 scopus 로고    scopus 로고
    • MOCA: Mobile certificate authority for wireless ad hoc networks
    • S. Yi and R. Kravets. MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In Proceedings of PKI '03, 2003.
    • (2003) Proceedings of PKI '03
    • Yi, S.1    Kravets, R.2
  • 19
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.