메뉴 건너뛰기




Volumn 62, Issue 9, 2013, Pages 1893-1898

Group authentication

Author keywords

Ad hoc network; Authentication; Group communication; Group oriented applications; Secret sharing

Indexed keywords

AUTHENTICATION SCHEME; GROUP COMMUNICATIONS; GROUP-ORIENTED; MULTIPLE AUTHENTICATIONS; SECRET SHARING; SYNCHRONOUS COMMUNICATIONS; USER AUTHENTICATION; USER AUTHENTICATION SCHEME;

EID: 84881192601     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2012.251     Document Type: Article
Times cited : (128)

References (17)
  • 1
    • 78649362825 scopus 로고    scopus 로고
    • Balancing revocation and storage trade-offs in secure group communication
    • Jan/Feb
    • B. Bruhadeshwar and S.S. Kulkarni, "Balancing Revocation and Storage Trade-Offs in Secure Group Communication," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 1, pp. 58-73, Jan./Feb. 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.1 , pp. 58-73
    • Bruhadeshwar, B.1    Kulkarni, S.S.2
  • 3
    • 70449388877 scopus 로고    scopus 로고
    • Self-organized authentication in mobile ad-hoc networks
    • P. Caballero-Gil and C. Hernández-Goya, "Self-Organized Authentication in Mobile Ad-Hoc Networks," J. Comm. and Networks, vol. 11, no. 5, pp. 509-517, 2009.
    • (2009) J. Comm. and Networks , vol.11 , Issue.5 , pp. 509-517
    • Caballero-Gil, P.1    Hernández-Goya, C.2
  • 4
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.-Mar
    • S. Capkun, L. Buttyan, and J.P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar
    • M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Comm., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
    • (2009) IEEE Trans. Wireless Comm , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 6
    • 33747064900 scopus 로고    scopus 로고
    • Public-key cryptography extensions into Kerberos
    • DOI 10.1109/MP.2002.1166623
    • I. Downnard, "Public-Key Cryptography Extensions into Kerberos," IEEE Potentials, vol. 21, no. 5, pp. 30-34, 2003. (Pubitemid 44208101)
    • (2002) IEEE Potentials , vol.21 , Issue.5 , pp. 30-34
    • Downnard, I.1
  • 7
    • 79960556311 scopus 로고    scopus 로고
    • Generalized digital certificate for user authentication and key establishment for secure communications
    • July
    • L. Harn and J. Ren, "Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications," IEEE Trans. Wireless Comm., vol. 10, no. 7, pp. 2372-2379, July 2011.
    • (2011) IEEE Trans. Wireless Comm , vol.10 , Issue.7 , pp. 2372-2379
    • Harn, L.1    Ren, J.2
  • 8
    • 84881127851 scopus 로고    scopus 로고
    • 802.1x, ieee standard for local and metropolitan area networks, port-based network access control
    • IEEE CS
    • IEEE CS, "802.1X, IEEE Standard for Local and Metropolitan Area Networks, Port-Based Network Access Control," The Inst. of Electrical and Electronics Engineers, Inc., 2004.
    • (2004) The Inst. of Electrical and Electronics Engineers, Inc
  • 9
    • 23044436725 scopus 로고    scopus 로고
    • Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
    • July
    • W.C. Ku, "Weaknesses and Drawbacks of a Password Authentication Scheme Using Neural Networks for Multiserver Architecture," IEEE Trans. Neural Networks, vol. 16, no. 4, pp. 1002-1005, July 2005.
    • (2005) IEEE Trans. Neural Networks , vol.16 , Issue.4 , pp. 1002-1005
    • Ku, W.C.1
  • 10
    • 49849102924 scopus 로고    scopus 로고
    • Ssl/tls session-aware user authentication
    • R. Oppliger, R. Hauser, and D. Basin, "SSL/TLS Session-Aware User Authentication," Computer, vol. 41, no. 3, pp. 59-65, 2008.
    • (2008) Computer , vol.41 , Issue.3 , pp. 59-65
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 11
    • 77951680448 scopus 로고    scopus 로고
    • Combined authentication-based multilevel access control in mobile application for dailylifeservice
    • June
    • H.A. Park, J.W. Hong, J.H. Park, J. Zhan, and D.H. Lee, "Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService," IEEE Trans. Mobile Computing, vol. 9, no. 6, pp. 824-837, June 2010.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.6 , pp. 824-837
    • Park, H.A.1    Hong, J.W.2    Park, J.H.3    Zhan, J.4    Lee, D.H.5
  • 13
    • 70350230005 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • Oct
    • K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-User Broadcast Authentication in Wireless Sensor Networks," IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 4554-4564, Oct. 2009.
    • (2009) IEEE Trans. Vehicular Technology , vol.58 , Issue.8 , pp. 4554-4564
    • Ren, K.1    Yu, S.2    Lou, W.3    Zhang, Y.4
  • 14
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 78650326704 scopus 로고    scopus 로고
    • Survey of security services on group communications
    • Dec
    • P. Sakarindr and N. Ansari, "Survey of Security Services on Group Communications," IET Information Security vol. 4, no. 4, pp. 258-272, Dec. 2010.
    • (2010) IET Information Security , vol.4 , Issue.4 , pp. 258-272
    • Sakarindr, P.1    Ansari, N.2
  • 16
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 17
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • DOI 10.1109/MSP.2004.81
    • J. Yan, A. Blackwell, R. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security and Privacy Magazine, vol. 2, no. 5, pp. 25-31, Sept./Oct. 2004. (Pubitemid 40168623)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Alan, B.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.