-
1
-
-
4544385042
-
An authenticated broadcasting scheme for wireless ad hoc network
-
IEEE Computer Society
-
M.J. Bohio, and A. Miri An authenticated broadcasting scheme for wireless ad hoc network Proc. CNSR 2004 2004 IEEE Computer Society 69 74
-
(2004)
Proc. CNSR 2004
, pp. 69-74
-
-
Bohio, M.J.1
Miri, A.2
-
2
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
M.J. Bohio, and A. Miri Efficient identity-based security schemes for ad hoc network routing protocols J. Ad Hoc Netw. 2 3 2004 309 317
-
(2004)
J. Ad Hoc Netw.
, vol.2
, Issue.3
, pp. 309-317
-
-
Bohio, M.J.1
Miri, A.2
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
LNCS Springer
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing Proc. Crypto 2001 LNCS 2001 Springer 213 219
-
(2001)
Proc. Crypto 2001
, pp. 213-219
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
84946840347
-
Short signatures from the weil pairing
-
LNCS Springer
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the weil pairing Proc. ASIACRYPT LNCS 2001 Springer 514 532
-
(2001)
Proc. ASIACRYPT
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
34548839108
-
Improved id-based security framework for ad hoc network
-
H.-Y. Chien, and R.-Y. Lin Improved id-based security framework for ad hoc network Ad Hoc Netw. 6 1 2008 47 60
-
(2008)
Ad Hoc Netw.
, vol.6
, Issue.1
, pp. 47-60
-
-
Chien, H.-Y.1
Lin, R.-Y.2
-
9
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
-
H. Deng, and D.P. Agrawal TIDS: threshold and identity-based security scheme for wireless ad hoc networks Ad Hoc Netw. 2 3 2004 291 307
-
(2004)
Ad Hoc Netw.
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
10
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
IEEE
-
H. Deng, A. Mukherjee, and D.P. Agrawal Threshold and identity-based key management and authentication for wireless ad hoc networks Proc. ITCC 2004 IEEE 107 111
-
(2004)
Proc. ITCC
, pp. 107-111
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.P.3
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R.L. Rivest A digital signature scheme secure against adaptive chosen-message attacks J. SIAM Comput. 17 April 1988 281 308
-
(1988)
J. SIAM Comput.
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
13
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
IEEE
-
A. Khalili, J. Katz, and W.A. Arbaugh Toward secure key distribution in truly ad-hoc networks Proc. SAINT Workshops 2003 IEEE 342 346
-
(2003)
Proc. SAINT Workshops
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
15
-
-
1642464769
-
On-demand secure routing protocol for ad hoc network using id based cryptosystem
-
IEEE
-
Y.-H. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon On-demand secure routing protocol for ad hoc network using id based cryptosystem Proc. 4th ICPDCAT 2003 IEEE 211 215
-
(2003)
Proc. 4th ICPDCAT
, pp. 211-215
-
-
Lee, Y.-H.1
Kim, H.2
Chung, B.3
Lee, J.4
Yoon, H.5
-
17
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
J.V.D. Merwe, D. Dawoud, and S. McDonald A survey on peer-to-peer key management for mobile ad hoc networks ACM Comput. Surv. 39 1 2007 1 45
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
, pp. 1-45
-
-
Merwe, J.V.D.1
Dawoud, D.2
McDonald, S.3
-
18
-
-
25844478002
-
ISMANET: A secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
-
B.-N. Park, and W. Lee ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks J. IEICE Trans. Commun. 2005 2548 2556
-
(2005)
J. IEICE Trans. Commun.
, pp. 2548-2556
-
-
Park, B.-N.1
Lee, W.2
-
23
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun. ACM 22 1 1979 612 613
-
(1979)
Commun. ACM
, vol.22
, Issue.1
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
58049127745
-
Identity-based fully distributed certificate authority in an OLSR MANET
-
IEEE
-
P. Xia, M. Wu, K. Wang, and X. Chen Identity-based fully distributed certificate authority in an OLSR MANET Proc. 4th Wireless Communications, Networking and Mobile Computing 2008 IEEE 1 4
-
(2008)
Proc. 4th Wireless Communications, Networking and Mobile Computing
, pp. 1-4
-
-
Xia, P.1
Wu, M.2
Wang, K.3
Chen, X.4
-
25
-
-
63149177861
-
Identity-based threshold key management for ad hoc networks
-
IEEE
-
Y. Zhang, J. Liu, Y. Wang, J. Han, H. Wang, and K. Wang Identity-based threshold key management for ad hoc networks Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application 2008 IEEE 797 801
-
(2008)
Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application
, pp. 797-801
-
-
Zhang, Y.1
Liu, J.2
Wang, Y.3
Han, J.4
Wang, H.5
Wang, K.6
-
26
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
IEEE
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang MASK: anonymous on-demand routing in mobile ad hoc networks Wireless Commun. 2006 IEEE 2376 2385
-
(2006)
Wireless Commun.
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
27
-
-
24144449947
-
AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks
-
IEEE
-
Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks Proc. International Conference on Communications 2005 IEEE 3515 3519
-
(2005)
Proc. International Conference on Communications
, pp. 3515-3519
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
Kwon, Y.5
-
30
-
-
84875734081
-
PAPA-UIC: A design approach and a framework for secure mobile ad hoc networks
-
S. Zhao, and A. Aggarwal PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks J. Secur. Commun. Netw. 3 2010 371 383
-
(2010)
J. Secur. Commun. Netw.
, vol.3
, pp. 371-383
-
-
Zhao, S.1
Aggarwal, A.2
-
33
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou, and Z.J. Haas Securing ad hoc networks J. IEEE Netw. 13 6 1999 24 30
-
(1999)
J. IEEE Netw.
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|