-
4
-
-
44249092835
-
A distributed certificate authority and key establishment protocol for mobile ad hoc networks
-
ICACT
-
A. Fanian, S.M. Sajadieh, M. Berenjkoub, and P. Khadivi A distributed certificate authority and key establishment protocol for mobile ad hoc networks 10th International Conference on Advanced Communication Technology, vol. 2 ICACT 2008 1157 1162
-
(2008)
10th International Conference on Advanced Communication Technology, Vol. 2
, pp. 1157-1162
-
-
Fanian, A.1
Sajadieh, S.M.2
Berenjkoub, M.3
Khadivi, P.4
-
5
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security 8 2 2005 228 258
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
8
-
-
33845940708
-
Securing ad hoc networks with 'asymmetric' probabilistic key predistribution schemes
-
M. Ramkumar Securing ad hoc networks with 'asymmetric' probabilistic key predistribution schemes IEEE Information Assurance Workshop 2006 290 296
-
(2006)
IEEE Information Assurance Workshop
, pp. 290-296
-
-
Ramkumar, M.1
-
9
-
-
38449094126
-
Multigrid based key predistribution scheme in ad hoc networks
-
Lecture Notes in Computer Science
-
C. Liu, and H. Jiang Multigrid based key predistribution scheme in ad hoc networks Third International Conference on Mobile ad-hoc and Sensor Networks Lecture Notes in Computer Science vol. 4864 2007 749 759
-
(2007)
Third International Conference on Mobile Ad-hoc and Sensor Networks
, vol.4864
, pp. 749-759
-
-
Liu, C.1
Jiang, H.2
-
12
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang Providing robust and ubiquitous security support for mobile ad-hoc networks Proceedings of Ninth International Conference on Network Protocols 2001 251 260
-
(2001)
Proceedings of Ninth International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
16
-
-
20444502239
-
An ID-based broadcast encryption scheme for key distribution
-
X.J. Du, Y. Wang, J.H. Ge, and Y.M. Wang An ID-based broadcast encryption scheme for key distribution IEEE Transactions on Broadcasting 51 2 2005 264 266
-
(2005)
IEEE Transactions on Broadcasting
, vol.51
, Issue.2
, pp. 264-266
-
-
Du, X.J.1
Wang, Y.2
Ge, J.H.3
Wang, Y.M.4
-
19
-
-
35048832490
-
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
-
Lecture Notes in Computer Science
-
M. Bellare, A. Boldyreva, and A. Palacio An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Proceedings of EUROCRYPT04 Lecture Notes in Computer Science vol. 3027 2004 171 188
-
(2004)
Proceedings of EUROCRYPT04
, vol.3027
, pp. 171-188
-
-
Bellare, M.1
Boldyreva, A.2
Palacio, A.3
-
20
-
-
84979291225
-
Broadcast encryption
-
Lecture Notes in Computer Science
-
A. Fiat, and M. Naor Broadcast encryption Proceedings of CRYPTO94 Lecture Notes in Computer Science vol. 773 1994 480 491
-
(1994)
Proceedings of CRYPTO94
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
21
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Lecture Notes in Computer Science
-
D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys Proceedings of Crypto05 Lecture Notes in Computer Science vol. 3621 2005 258 275
-
(2005)
Proceedings of Crypto05
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
22
-
-
36348947024
-
Comments on an efficient ID-based broadcast encryption scheme
-
H.Y. Chien Comments on an efficient ID-based broadcast encryption scheme IEEE Transactions on Broadcasting 53 4 2007 809 810
-
(2007)
IEEE Transactions on Broadcasting
, vol.53
, Issue.4
, pp. 809-810
-
-
Chien, H.Y.1
-
23
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Lecture Notes in Computer Science
-
C. Delerablee Identity-based broadcast encryption with constant size ciphertexts and private keys Proceedings of Asiacrypt07 Lecture Notes in Computer Science vol. 4833 2007 200 215
-
(2007)
Proceedings of Asiacrypt07
, vol.4833
, pp. 200-215
-
-
Delerablee, C.1
-
24
-
-
50549101800
-
Public key broadcast encryption schemes with shorter transmissions
-
J. Park, H. Kim, M. Sung, and D. Lee Public key broadcast encryption schemes with shorter transmissions IEEE Transactions on Broadcasting 54 3 2008 401 411
-
(2008)
IEEE Transactions on Broadcasting
, vol.54
, Issue.3
, pp. 401-411
-
-
Park, J.1
Kim, H.2
Sung, M.3
Lee, D.4
-
27
-
-
84856791522
-
Identity-based broadcast encryption based on ad hoc networks
-
J. Sun, Y. Hu, and L. Zhang Identity-based broadcast encryption based on ad hoc networks Computer Science 38 2 2011 46 49
-
(2011)
Computer Science
, vol.38
, Issue.2
, pp. 46-49
-
-
Sun, J.1
Hu, Y.2
Zhang, L.3
-
29
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM Journal on Computing 32 3 2003 586 615
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
31
-
-
84871565550
-
A communication efficient group key distribution scheme for MANETs
-
NSS (this paper is an extension version of the paper published in NSS 2012)
-
Y. Yang A communication efficient group key distribution scheme for MANETs Proceedings of the 6th International Conference on Network and System Security NSS 2012 361 372 (this paper is an extension version of the paper published in NSS 2012)
-
(2012)
Proceedings of the 6th International Conference on Network and System Security
, pp. 361-372
-
-
Yang, Y.1
-
33
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
Lecture Notes in Computer Science
-
C. Gentry, and B. Waters Adaptive security in broadcast encryption systems (with short ciphertexts) Proceedings of Eurocrypt09 Lecture Notes in Computer Science vol. 5479 2009 171 188
-
(2009)
Proceedings of Eurocrypt09
, vol.5479
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
36
-
-
82755161855
-
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
-
L. Zhang, Y. Hu, and Q. Wu Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups Mathematical and Computer Modelling 55 1-2 2012 12 18
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.12
, pp. 12-18
-
-
Zhang, L.1
Hu, Y.2
Wu, Q.3
|