-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS, Springer-Verlag
-
A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology-Crypto 84, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
Advances in Cryptology-Crypto 84
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing", Advances in Cryptology-Crypto'2001, vol. 2139 of Lecture Notes in Computer Science, pages 21329. Springer-Verlag, 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
49149112756
-
Efficient and secure key agreement for merging clusters in ad-hoc networking environments
-
S. Shin and T. Kwon, "Efficient and secure key agreement for merging clusters in ad-hoc networking environments", IEICE Trans. Commun., pp. 1575-1583, vol. E90-B, no. 7, 2007.
-
(2007)
IEICE Trans. Commun.
, vol.E90-B
, Issue.7
, pp. 1575-1583
-
-
Shin, S.1
Kwon, T.2
-
4
-
-
34247118827
-
D-VKT: A scalable distributed key agreement scheme for dynamic collaborative groups
-
DOI 10.1093/ietcom/e90-b.4.750
-
J. Zhang, L. Sun, Y. Tang, and S. Yang, "D-VKT: a scalable distributed key agreement scheme for dynamic collaborative groups", IEICE Trans. vol. 90-B, no. 4, pp. 750-760, 2007. (Pubitemid 46600064)
-
(2007)
IEICE Transactions on Communications
, vol.E90-B
, Issue.4
, pp. 750-760
-
-
Zhang, J.1
Sun, L.-F.2
Tang, Y.3
Yang, S.-Q.4
-
5
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network Mag., vol. 13, no. 6, 1999. (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
6
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret", Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
85023809951
-
Threshold cryptosystems
-
Aug
-
Y. Desmedt and Y. Frankel, "Threshold cryptosystems", CRYPTO 9, pp. 307-315, Aug. 1989.
-
(1989)
CRYPTO 9
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
8
-
-
38049003964
-
A survey of key management in ad hoc networks
-
3rd Quarter
-
A. M. Hegland, E. Winjum, S. Mjolsnes, C. Rong, Kure, and P. Spilling, "A survey of key management in ad hoc networks", IEEE Commun. Surveys Tutorials, 3rd Quarter 2006.
-
(2006)
IEEE Commun. Surveys Tutorials
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.3
Rong, C.4
Kure5
Spilling, P.6
-
9
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
DOI 10.1145/1216370.1216371
-
J. van der Merwe, D. Dawoud, and S. McDonald, "A survey on peerto-peer key management for mobile ad hoc networks", ACM Comput. Surveys, vol. 39, no. 1, 2007. (Pubitemid 46572786)
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1216371
-
-
Van Der Merwe, J.1
Dawoud, D.2
McDonald, S.3
-
10
-
-
49149102876
-
A recent survey on key management schemes in MANET
-
Damascus, Syria, Apr
-
A. Baayer, N. Enneya, and M. El Koutbi, "A recent survey on key management schemes in MANET", in International Conf. Inf. Commun. Technol.: From Theory to Applications, Damascus, Syria, Apr. 2008.
-
(2008)
International Conf. Inf. Commun. Technol.: From Theory to Applications
-
-
Baayer, A.1
Enneya, N.2
El Koutbi, M.3
-
12
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
DOI 10.1109/TNET.2004.838598
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: ubiquitous and robust access control for mobile ad hoc networks", IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004. (Pubitemid 40085372)
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
13
-
-
84943517115
-
On the unitility of distributed cryptography in P2P and manets: The case of membership control
-
Nov
-
M. Narasimha, G. Tsudik, and J. H. Yi, "On the unitility of distributed cryptography in P2P and manets: the case of membership control", IEEE Int'l Conf. Netw. Protocols, Nov. 2003.
-
(2003)
IEEE Int'l Conf. Netw. Protocols
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
15
-
-
18244376871
-
Efficient and robust key management for large mobile ad hoc networks
-
DOI 10.1016/j.comnet.2004.11.023, PII S1389128604003433
-
B. Zhu et al., "Efficient and robust key management for large mobile ad hoc networks", Comput. Netw., vol. 48, no. 4, pp. 6572, July 2005. (Pubitemid 40626649)
-
(2005)
Computer Networks
, vol.48
, Issue.4
, pp. 657-682
-
-
Zhu, B.1
Bao, F.2
Deng, R.H.3
Kankanhalli, M.S.4
Wang, G.5
-
17
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
DOI 10.1007/s00145-004-0312-y
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman", in Proc. ANTS IV, LNCS 1838, pp. 38594, Springer-Verlag, 2000. (Pubitemid 41201459)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
18
-
-
0346265020
-
Extending Joux's protocol to multi party key agreement
-
Progress in Cryptology - INDOCRYPT 2003
-
R. Barua, R. Dutta, and P. Sarkar, "Extending Joux's protocol to multi party key agreement", Indocrypt3, LNCS 2904, pp. 20517, Springer-Verlag, 2003. (Pubitemid 37528723)
-
(2003)
Lecture notes in Computer Science
, Issue.2904
, pp. 205-217
-
-
Barua, R.1
Dutta, R.2
Sarkar, P.3
-
19
-
-
35048874197
-
Efficient ID-based group key agreement with Bilinear maps
-
Public Key Cryptography - PKC 2004
-
K. Choi, J. Hwang, and D. Lee, "Efficient ID-based group key agreement with bilinear maps", PKC4, LNCS 2947, pp. 13044, Springer-Verlag, 2004. (Pubitemid 38285379)
-
(2004)
Lecture Notes in Computer Science
, Issue.2947
, pp. 130-144
-
-
Choi, K.Y.1
Hwang, J.Y.2
Lee, D.H.3
-
21
-
-
77951703530
-
Cryptanalysis of the Chang-Wu-Chen key distribution system
-
Advances in Cryptology - EUROCRYPT '93
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", Advances Cryptology-EURO-CRYPT4, Lecture Notes Comp. Science, Springer-Verlag, Berlin Germany, 1994. (Pubitemid 24767316)
-
(1994)
Lecture Notes in Computer Science
, Issue.765
, pp. 440
-
-
Burmester, M.1
-
23
-
-
33846419850
-
Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
-
DOI 10.1093/ietfec/e90-a.1.295
-
K. Shim, "Further analysis of ID-based authenticated group key agreement protocol from bilinear maps", IEICE Trans., vol. E90-A, no. 1, Jan. 2007. (Pubitemid 46145234)
-
(2007)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E90-A
, Issue.1
, pp. 295-298
-
-
Shim, K.-A.1
-
24
-
-
34548131623
-
Multiparty key agreement for secure teleconferencing
-
C. H. Lin, H. H. Lin, and J. H. Chang, "Multiparty key agreement for secure teleconferencing", in Proc. IEEE International Conf. Systems, Man Cybernetics 2006, vol. 5, pp. 3702-3707.
-
(2006)
Proc. IEEE International Conf. Systems, Man. Cybernetics
, vol.5
, pp. 3702-3707
-
-
Lin, C.H.1
Lin, H.H.2
Chang, J.H.3
-
25
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer-Verlag, LNCS 2442
-
P. S. L. M. Barreto, H. Y. Kim, and M. Scott, "Efficient algorithms for pairing-based cryptosystems", Advances in Cryptology-Crypto'2002, Springer-Verlag, LNCS 2442, pp. 354-368.
-
Advances in Cryptology-Crypto'2002
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Scott, M.3
-
26
-
-
84986946222
-
Optimal clustering structures for hierarchicall topological design of large computer networks
-
Fall
-
L. Kleinrock and F. Kamoun, "Optimal clustering structures for hierarchicall topological design of large computer networks", Netw., pp. 221-248, Fall 1980.
-
(1980)
Netw.
, pp. 221-248
-
-
Kleinrock, L.1
Kamoun, F.2
-
27
-
-
0032632328
-
Optimization algorithms for large self-structuring networks
-
Mar
-
R. Krishnan, R. Ramanathan, and M. Steenstrup, "Optimization algorithms for large self-structuring networks", in Proc. IEEE INFOCOM, pp. 71-78, Mar. 1999.
-
(1999)
Proc. IEEE INFOCOM
, pp. 71-78
-
-
Krishnan, R.1
Ramanathan, R.2
Steenstrup, M.3
-
28
-
-
8344229909
-
A cluster based security architecture for ad hoc networks
-
Mar
-
M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, "A cluster based security architecture for ad hoc networks", in Proc. IEEE INFOCOM, Mar. 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
30
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing or: how to cope with perpetual leakage", in Proc. CRYPTO 5, pp. 339-352, 1995.
-
(1995)
Proc. CRYPTO 5
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
31
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
N. McCullagh and P. S. L. M. Barreto, "A new two-party identity-based authenticated key agreement", Cryptology CT-RSA 2005, Springer-Verlag LNCS 3376, 26274, 2005. (Pubitemid 41231216)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
33
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing", Advances Cryptology-Crypto 91, LNCS 576, 1992, pp. 12940.
-
(1992)
Advances Cryptology-Crypto 91, LNCS 576
, pp. 12940
-
-
Pedersen, T.1
-
34
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
D. Liu, P. Ning, and K. Sun, "Efficient self-healing key distribution with revocation capability", in Proc. 10th ACM Conf. Comput. Commun. Security, pp. 231-240, 2003. (Pubitemid 40673805)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
35
-
-
0036086453
-
Self-healing key distribution with revocation
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean, "Self-healing key distribution with revocation", IEEE Symp. Security Privacy, pp. 224-240, 2002. (Pubitemid 34648117)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 241-257
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
36
-
-
33750419991
-
Randomness in self-healing key distribution schemes
-
DOI 10.1109/ITWTPI.2005.1543962, 1543962, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
-
C. Blundo, P. D'Arco, A. Santis, and M. Listo, "Design of self-healing key distribution schemes", Design Codes Cryptography, no. 32, pp. 15-44, 2004. (Pubitemid 44641699)
-
(2005)
2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
, vol.2005
, pp. 80-84
-
-
Blundo, C.1
-
38
-
-
85015284120
-
Energy aware lossless data compression
-
May
-
K. Barr and K. Asanovic, "Energy aware lossless data compression", in Proc. First Int'l Conf. Mobile Systems, Applications, Services (MobiSys 3), pp. 231-244, May 2003.
-
(2003)
Proc. First Int'l Conf. Mobile Systems, Applications, Services (MobiSys 3)
, pp. 231-244
-
-
Barr, K.1
Asanovic, K.2
-
40
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
DOI 10.1109/JSAC.2005.861384
-
H. Yang, X. Meng, and S. Lu, "Self-organized network layer security in mobile ad hoc networks", First ACM Workshop Wireless Security (WiSe), 2002. (Pubitemid 43269748)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
41
-
-
77957665398
-
Security issues in mobile ad hoc networks - A survey
-
University of Maryland, Baltimore County
-
W. Li and A. Joshi, "Security issues in mobile ad hoc networks-a survey", Dept. Computer Science Electrical Engineering, University of Maryland, Baltimore County.
-
Dept. Computer Science Electrical Engineering
-
-
Li, W.1
Joshi, A.2
-
42
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Fourth Quarter
-
D. Djenouri, L. Khelladi, and A. N. Badache. "A survey of security issues in mobile ad hoc and sensor networks", IEEE Commun. Surveys Tutorials, vol. 7, no. 4, pp. 2-28, Fourth Quarter 2005.
-
(2005)
IEEE Commun. Surveys Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
43
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Cryptography and Coding
-
S. Blake-Wilson, D. Johnson, and A. Menezes, "Key agreement protocols and their security analysis", Sixth IMA International Conf. Cryptography Coding, Cirencester, England, 1997. (Pubitemid 128005797)
-
(1997)
Lecture Notes in Computer Science
, Issue.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
46
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
T. Imielinski and H. Korth, editors, Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks", T. Imielinski and H. Korth, editors, Mobile Computing, vol. 353, pp. 15381, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
, pp. 15381
-
-
Johnson, D.B.1
Maltz, D.A.2
-
47
-
-
33745201299
-
-
Shamus Software Ltd., Online. Available
-
Shamus Software Ltd., "Miracl library." [Online]. Available: http://www.shamus.ie/.
-
Miracl library
-
-
-
48
-
-
77957914532
-
GNU general public license
-
Online. Available
-
GNU General Public License, "PBC library." [Online]. Available: http://crypto.stanford.edu/pbc/.
-
PBC library
-
-
-
49
-
-
77957895140
-
-
National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2
-
National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-2.
-
-
-
-
50
-
-
77957904087
-
-
Online. Available:, Aug
-
R. Rivest, M. Robshaw, R. Sidney, and L. Yin, "The rc6 block cipher (v1.1)." [Online]. Available: ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/ rc6v11.pdf, Aug. 2006.
-
(2006)
The Rc6 Block Cipher (v1.1)
-
-
Rivest, R.1
Robshaw, M.2
Sidney, R.3
Yin, L.4
-
51
-
-
0000112683
-
-
Jan
-
N. Koblitz, "Elliptic curve cryptosystems, mathematics of computation", vol. 48, no. 177. Jan. 1987, pp. 203-209.
-
(1987)
Elliptic Curve Cryptosystems, Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
|