메뉴 건너뛰기




Volumn 8491, Issue , 2014, Pages 267-278

Secure device-to-device authentication in mobile multi-hop networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 84919384470     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-07782-6_25     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 2
    • 84919367487 scopus 로고    scopus 로고
    • IEEE 802.15 WPAN Task Group8 Peer Aware Communications, http://www.ieee802.org/15/pub/TG8.html
  • 4
  • 5
    • 84897805409 scopus 로고    scopus 로고
    • Device-to-Device communications with Wi-Fi Direct: Overview and experimentation
    • Camps-Mur, D., Garcia-Saavedra, A., Serrano, P.: Device-to-Device communications with Wi-Fi Direct: overview and experimentation. IEEE Wireless Commun 20(3), 96–104 (2013)
    • (2013) IEEE Wireless Commun , vol.20 , Issue.3 , pp. 96-104
    • Camps-Mur, D.1    Garcia-Saavedra, A.2    Serrano, P.3
  • 6
    • 0003582910 scopus 로고    scopus 로고
    • Addison Wesley Professional, Indianapolis
    • Perkins, C.: Ad Hoc Networking, pp. 1–23. Addison Wesley Professional, Indianapolis (2000)
    • (2000) Ad Hoc Networking , pp. 1-23
    • Perkins, C.1
  • 13
    • 80052178487 scopus 로고    scopus 로고
    • Secure Mutual Authentication Protocols for Mobile Multihop Relay WIMAX Networks against Rogue Base/Relay Stations
    • Huang, J., Huang, C.: Secure Mutual Authentication Protocols for Mobile Multihop Relay WIMAX Networks against Rogue Base/Relay Stations. In: 2011 IEEE International Conference on Communications, pp. 1–5 (2011)
    • (2011) 2011 IEEE International Conference on Communications , pp. 1-5
    • Huang, J.1    Huang, C.2
  • 14
    • 84870624100 scopus 로고    scopus 로고
    • A new authentication scheme for wireless Ad Hoc Network. 2012 Information Management
    • Zhu, X., Xu, S.: A new authentication scheme for wireless Ad Hoc Network. 2012 Information Management, Innovation Management and Industrial Engineering 2, 312–315 (2012)
    • (2012) Innovation Management and Industrial Engineering , vol.2 , pp. 312-315
    • Zhu, X.1    Xu, S.2
  • 16
    • 31344471100 scopus 로고    scopus 로고
    • Man in the Middle Attacks on Bluetooth
    • In: Wright, R.N. (ed.), Springer, Heidelberg
    • Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003)
    • (2003) FC 2003. LNCS , vol.2742 , pp. 149-161
    • Kügler, D.1
  • 18
    • 84919400495 scopus 로고    scopus 로고
    • Wi-Fi Multi-media(including WMM PowerSave) Specification v1.1
    • Wi-Fi Alliance: Quality of Service (QoS) Task Group, Wi-Fi Multi-media(including WMM PowerSave) Specification v1.1 (2005)
    • (2005) Quality of Service (QoS) Task Group
  • 19
    • 61849103248 scopus 로고    scopus 로고
    • Wi-Fi Protected Setup Specification
    • Wi-Fi Alliance: Wi-Fi Protected Setup Specification, Wi-Fi Alliance Document (2007)
    • (2007) Wi-Fi Alliance Document
  • 20
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 21
    • 85020598353 scopus 로고
    • Identity-based crptosystems and signature schemes
    • In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
    • Shamir, A.: Identity-based crptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 22
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • In: Kilian, J. (ed.), Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 23
    • 77950151506 scopus 로고    scopus 로고
    • An Identity Based Encryption Scheme based on Quadratic Residues
    • In: Honary, B. (ed.), Springer, Heidelberg
    • Cocks, C.: An Identity Based Encryption Scheme based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
    • (2001) Cryptography and Coding 2001. LNCS , vol.2260 , pp. 360-363
    • Cocks, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.