메뉴 건너뛰기




Volumn , Issue , 2010, Pages 176-180

Group key agreement scheme for mobile ad hoc networks based on threshold secret sharing

Author keywords

Group key agreement; Mobile ad hoc networks (MANETs); Secret sharing; Threshold cryptosystem

Indexed keywords

DYNAMIC CHANGES; GROUP KEY; GROUP KEY AGREEMENT; KEY AGREEMENT; KEY ISSUES; KEY MANAGEMENT; MOBILE AD HOC NETWORKS (MANETS); SECRET SHARING; SECURITY REQUIREMENTS; SESSION KEY; SINGLE POINT; STORAGE COSTS; THRESHOLD CRYPTOGRAPHY; THRESHOLD CRYPTOSYSTEMS; THRESHOLD SECRET SHARING;

EID: 77957599250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISECS.2010.47     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Special Issue on Networks Security
    • L. Zhou and Z. Hass, Securing Ad Hoc Networks, IEEE Network, Special Issue on Networks Security, Vol. 13, No. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Hass, Z.2
  • 3
    • 0242340688 scopus 로고    scopus 로고
    • Making the key agreement protocol in mobile ad hoc network more efficient
    • LNCS 2846
    • G. Yao, K. Ren, F. Bao et al, Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient, Applied Cryptography and Network Security, LNCS 2846, pp. 343- 356, 2003.
    • (2003) Applied Cryptography and Network Security , pp. 343-356
    • Yao, G.1    Ren, K.2    Bao, F.3
  • 5
    • 79952914028 scopus 로고    scopus 로고
    • An authenticated key agreement protocol for mobile AD hoc networks
    • LNCS 4325
    • X. Zou, A. Thukral and B. Ramamurthy, An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks, Mobile Ad-hoc and Sensor Networks, LNCS 4325, pp. 509- 520, 2006.
    • (2006) Mobile Ad-hoc and Sensor Networks , pp. 509-520
    • Zou, X.1    Thukral, A.2    Ramamurthy, B.3
  • 11
    • 0018545449 scopus 로고
    • How to share A secret
    • A. Shamir, How to Share A Secret, Communication of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 0032166974 scopus 로고    scopus 로고
    • Secret sharing with public reconstruction
    • A. Beimel and B. Chor, Secret Sharing with Public Reconstruction, IEEE Transactions On Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1887-1896
    • Beimel, A.1    Chor, B.2
  • 15
    • 84982943258 scopus 로고
    • No-interactive and information-theoretic secure verifiable secret sharing
    • LNCS 576
    • T. P. Perdersen, No-interactive and Information-theoretic Secure Verifiable Secret Sharing, Proceedings of the Advances in Cryptography - CRYPTO'91, LNCS 576 pp.129-140, 1992.
    • (1992) Proceedings of the Advances in Cryptography - CRYPTO'91 , pp. 129-140
    • Perdersen, T.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.