-
1
-
-
0033357103
-
Securing ad hoc networks
-
Special Issue on Networks Security
-
L. Zhou and Z. Hass, Securing Ad Hoc Networks, IEEE Network, Special Issue on Networks Security, Vol. 13, No. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Hass, Z.2
-
2
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zefros, J. Kong et al, Self-securing Ad Hoc Wireless Networks, Proceedings of the Seventh IEEE Symposium on Computers and Communications, ISCC'02, pp. 548-555, 2002.
-
(2002)
Proceedings of the Seventh IEEE Symposium on Computers and Communications, ISCC'02
, pp. 548-555
-
-
Luo, H.1
Zefros, P.2
Kong, J.3
-
3
-
-
0242340688
-
Making the key agreement protocol in mobile ad hoc network more efficient
-
LNCS 2846
-
G. Yao, K. Ren, F. Bao et al, Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient, Applied Cryptography and Network Security, LNCS 2846, pp. 343- 356, 2003.
-
(2003)
Applied Cryptography and Network Security
, pp. 343-356
-
-
Yao, G.1
Ren, K.2
Bao, F.3
-
4
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
H. Deng, A. Mukherjee and D. P. Agrawal, Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC'04, pp. 107-110, 2004.
-
(2004)
Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC'04
, pp. 107-110
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.P.3
-
5
-
-
79952914028
-
An authenticated key agreement protocol for mobile AD hoc networks
-
LNCS 4325
-
X. Zou, A. Thukral and B. Ramamurthy, An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks, Mobile Ad-hoc and Sensor Networks, LNCS 4325, pp. 509- 520, 2006.
-
(2006)
Mobile Ad-hoc and Sensor Networks
, pp. 509-520
-
-
Zou, X.1
Thukral, A.2
Ramamurthy, B.3
-
10
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig and G. Tsudik, Tree-based Group Key Agreement, ACM Transactions on Information and System Security, Vol. 7, No. 1, pp. 60-96, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
11
-
-
0018545449
-
How to share A secret
-
A. Shamir, How to Share A Secret, Communication of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
0032166974
-
Secret sharing with public reconstruction
-
A. Beimel and B. Chor, Secret Sharing with Public Reconstruction, IEEE Transactions On Information Theory, Vol. 44, No. 5, pp. 1887-1896, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1887-1896
-
-
Beimel, A.1
Chor, B.2
-
15
-
-
84982943258
-
No-interactive and information-theoretic secure verifiable secret sharing
-
LNCS 576
-
T. P. Perdersen, No-interactive and Information-theoretic Secure Verifiable Secret Sharing, Proceedings of the Advances in Cryptography - CRYPTO'91, LNCS 576 pp.129-140, 1992.
-
(1992)
Proceedings of the Advances in Cryptography - CRYPTO'91
, pp. 129-140
-
-
Perdersen, T.P.1
-
17
-
-
54049095939
-
A verifiable (t; n) multiple secret sharing scheme and its analyses
-
L. Pang, H. Li, Y. Yao et al, A Verifiable (t; n) Multiple Secret Sharing Scheme and Its Analyses, Proceedings of 2008 International Symposium on Electronic Commerce and Security, pp. 22-26, 2008.
-
(2008)
Proceedings of 2008 International Symposium on Electronic Commerce and Security
, pp. 22-26
-
-
Pang, L.1
Li, H.2
Yao, Y.3
-
18
-
-
73149092547
-
A key management scheme for ad hoc networks
-
P. Zeng, R. Hu, Y. Fang et al, A Key Management Scheme for Ad Hoc Networks, Proceedings of the Fifth International Conference on Wireless Communications, Networking and Mobile Computing, WiCom'09, pp. 1-5, 2009.
-
(2009)
Proceedings of the Fifth International Conference on Wireless Communications, Networking and Mobile Computing, WiCom'09
, pp. 1-5
-
-
Zeng, P.1
Hu, R.2
Fang, Y.3
|