-
1
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24-30 (1999)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
2
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of Ninth International Conference on Network Protocols, pp. 251-260 (2001)
-
(2001)
Proceedings of Ninth International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
3
-
-
14844312136
-
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
-
Jarecki, S., Saxena, N., Yi, J.H.: An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 1-9 (2004)
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 1-9
-
-
Jarecki, S.1
Saxena, N.2
Yi, J.H.3
-
4
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control
-
Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in P2P and MANETs: the case of membership control. In: Proceedings of 11th IEEE International Conference on Network Protocols, pp. 336-345 (2003)
-
(2003)
Proceedings of 11th IEEE International Conference on Network Protocols
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
5
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of 11th IEEE International Conference on Network Protocols, pp. 326-335 (2003)
-
(2003)
Proceedings of 11th IEEE International Conference on Network Protocols
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
7
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended to Group Communication
-
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proceedings of 3rd ACM Conference on Computer and Communications Security, pp. 31-37 (1996)
-
(1996)
Proceedings of 3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
8
-
-
0031629148
-
CLIQUES: A New Approach to Group Key Agreement
-
IEEE
-
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A New Approach to Group Key Agreement. In: IEEE, Proceedings of 18th International Conference on Distributed Computing Systems, pp. 380-387 (1998)
-
(1998)
Proceedings of 18th International Conference on Distributed Computing Systems
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
9
-
-
0034247455
-
Key Agreement in Dynamic Peer Groups
-
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769-780 (2002)
-
(2002)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
10
-
-
0005280428
-
Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication
-
Perrig, A.: Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication. In: International Workshop on Cryptographic Techniques and E-Commerce, pp. 192-202 (1999)
-
(1999)
International Workshop on Cryptographic Techniques and E-Commerce
, pp. 192-202
-
-
Perrig, A.1
-
11
-
-
3142512728
-
Tree-based Group Key Agreement
-
Kim, Y., Perrig, A., Tsudik, G.: Tree-based Group Key Agreement. ACM Transactions on Information and System Security 7(1), 60-96 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
12
-
-
40949099924
-
Diffie-Hellman Technique: Extended to Multiple Two-party Keys and One Multi-party Key
-
IET
-
Biswas, G.P.: Diffie-Hellman Technique: Extended to Multiple Two-party Keys and One Multi-party Key. Information Security, IET 2(1), 12-18 (2008)
-
(2008)
Information Security
, vol.2
, Issue.1
, pp. 12-18
-
-
Biswas, G.P.1
-
13
-
-
71549172209
-
Fully Robust Tree-Diffie-Hellman Group Key Exchange
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Brecher, T., Bresson, E., Manulis, M.: Fully Robust Tree-Diffie-Hellman Group Key Exchange. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 478-497. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 478-497
-
-
Brecher, T.1
Bresson, E.2
Manulis, M.3
-
14
-
-
77954807684
-
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
-
Tseng, Y.M., Wu, T.Y.: Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique. Informatica 21(2), 247-258 (2010)
-
(2010)
Informatica
, vol.21
, Issue.2
, pp. 247-258
-
-
Tseng, Y.M.1
Wu, T.Y.2
-
15
-
-
66249125156
-
An Identity-based Broadcast Encryption Scheme for Mobile Ad Hoc Networks
-
Ng, C.Y., Mu, Y., Susilo, W.: An Identity-based Broadcast Encryption Scheme for Mobile Ad Hoc Networks. Journal of Telecommunications and Information Technology 1, 24-29 (2006)
-
(2006)
Journal of Telecommunications and Information Technology
, vol.1
, pp. 24-29
-
-
Ng, C.Y.1
Mu, Y.2
Susilo, W.3
-
16
-
-
4243180376
-
The Random Oracle Methodology
-
Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology. Journal of the ACM 51, 557-594 (2004)
-
(2004)
Journal of the ACM
, vol.51
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
17
-
-
35048832490
-
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Palacio, A.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 171-188. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
18
-
-
58449126665
-
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
-
Zhang, L., Hu, Y., Mu, N.: An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. In: Proceedings of the 9th International Conference for Young Computer Scientists, pp. 1619-1623 (2008)
-
(2008)
Proceedings of the 9th International Conference for Young Computer Scientists
, pp. 1619-1623
-
-
Zhang, L.1
Hu, Y.2
Mu, N.3
-
19
-
-
0037623983
-
Identity-based Encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil pairing. SIAM Journal on Computing 32(3), 586-615 (2003)
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
21
-
-
84871558068
-
-
The PBC library
-
Lynn B.: The PBC library, http://crypto.stanford.edu/pbc/
-
-
-
Lynn, B.1
|