메뉴 건너뛰기




Volumn 13 LNICST, Issue , 2009, Pages 103-113

A face centered cubic key agreement mechanism for mobile ad hoc networks

Author keywords

Elliptic curve cryptography; Face centered cubic (FCC) structure; MANET security; Password authentication

Indexed keywords

ADJACENT NODES; CONTINUOUS FLOWS; DYNAMIC CHANGING TOPOLOGY; ELLIPTIC CURVE CRYPTOGRAPHY; FACE CENTERED CUBIC STRUCTURE; FACE-CENTERED CUBIC; KEY AGREEMENT; KEY ESTABLISHMENTS; MANET SECURITY; MOBILE AD HOC NETWORKING; MOBILE NODES; OPERATING MODES; PASSWORD AUTHENTICATION; PROCESSING POWER; PROPOSED ARCHITECTURES; STRONG AUTHENTICATION; THIN CLIENTS;

EID: 84865062484     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-03819-8_11     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 1
    • 85008048475 scopus 로고    scopus 로고
    • Cross-layer optimization for wireless systems: A european research key challenge
    • Verikoukis, C., Alonso, L., Giamalis, T.: Cross-Layer Optimization for Wireless Systems: A European Research Key Challenge. IEEE Communications Magazine 43(7), 1-3 (2005)
    • (2005) IEEE Communications Magazine , vol.43 , Issue.7 , pp. 1-3
    • Verikoukis, C.1    Alonso, L.2    Giamalis, T.3
  • 6
    • 0001278674 scopus 로고    scopus 로고
    • Complexity Estimates Depending on Condition and Round-Off Error
    • Cucker, F., Smale, S.: Complexity estimates depending on condition and round off error. Journal of the Association for Computing Machinery 46(1), 113-184 (2000) (Pubitemid 129592188)
    • (1999) Journal of the ACM , vol.46 , Issue.1 , pp. 113-184
    • Cucker, F.1    Smale, S.2
  • 7
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 4(8), 203-209 (1987)
    • (1987) Mathematics of Computation , vol.4 , Issue.8 , pp. 203-209
    • Koblitz, N.1
  • 8
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • DOI 10.1145/359340.359342
    • Rivest, R., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 10
    • 35048833769 scopus 로고    scopus 로고
    • Weak fields for ECC
    • Topics in Cryptology - CT-RSA 2004
    • Menezes, A., Teske, E., Weng, A.: Weak Fields for ECC. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 366-386. Springer, Heidelberg (2004) (Pubitemid 38271232)
    • (2004) Lecture Notes in Computer Science , Issue.2964 , pp. 366-386
    • Menezes, A.1    Teske, E.2    Weng, A.3
  • 12
    • 38049180923 scopus 로고    scopus 로고
    • Weak keys of pairing based diffie-hellman schemes on elliptic curves
    • Kalele, A.A., Sule, V.R.: Weak keys of pairing based Diffie-Hellman schemes on elliptic curves. Cryptology ePrint Archive 2005/30 (2005)
    • (2005) Cryptology EPrint Archive 2005/30
    • Kalele, A.A.1    Sule, V.R.2
  • 13
    • 0036867644 scopus 로고    scopus 로고
    • Multiparty authentication services and key agreement protocols with semi-trusted third party
    • Zheng, D., Chen, K., You, J.: Multiparty authentication services and key agreement protocols with semi-trusted third party. Journal of Computer Science and Technology archive 17(6), 749-756 (2002)
    • (2002) Journal of Computer Science and Technology Archive , vol.17 , Issue.6 , pp. 749-756
    • Zheng, D.1    Chen, K.2    You, J.3
  • 16
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • DOI 10.1016/S0140-3664(00)00249-8
    • Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627-1637 (2000) (Pubitemid 32033563)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 17
    • 38049127352 scopus 로고    scopus 로고
    • Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks, communications
    • Cambridge, USA October
    • Askoxylakis, I.G., Kastanis, D.D., Traganitis, A.P.: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks, Communications. In: Networks and Information Security CNIS 2006, Cambridge, USA (October 2006)
    • (2006) Networks and Information Security CNIS 2006
    • Askoxylakis, I.G.1    Kastanis, D.D.2    Traganitis, A.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.