메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 279-290

Efficient trust based information sharing schemes over distributed collaborative networks

Author keywords

identity based encryption; privacy preserving information sharing; trust based encryption; Trust management

Indexed keywords

COST REDUCTION; DATA PRIVACY; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION ANALYSIS; INFORMATION DISSEMINATION; INFORMATION MANAGEMENT; PEER TO PEER NETWORKS;

EID: 84930504473     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.SUP.0513025     Document Type: Article
Times cited : (7)

References (23)
  • 4
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Zhong, S.1    Chen, J.2    Yang, Y.R.3
  • 5
    • 77953306183 scopus 로고    scopus 로고
    • An opportunistic batch bundle authentication scheme for energy constrained DTNs
    • H. Zhu, X. Lin, R. Lu, X. Shen, D. Xing, and Z. Cao, "An opportunistic batch bundle authentication scheme for energy constrained DTNs," in Proc. IEEE INFOCOM, 2010, pp. 605-613.
    • (2010) Proc. IEEE INFOCOM , pp. 605-613
    • Zhu, H.1    Lin, X.2    Lu, R.3    Shen, X.4    Xing, D.5    Cao, Z.6
  • 6
    • 37849009419 scopus 로고    scopus 로고
    • Secure incentives for commercial ad dissemination in vehicular networks
    • S.-B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks," in Proc. ACM MobiHoc, 2007, pp. 150-159.
    • (2007) Proc. ACM MobiHoc , pp. 150-159
    • Lee, S.-B.1    Pan, G.2    Park, J.-S.3    Gerla, M.4    Lu, S.5
  • 7
    • 77952652973 scopus 로고    scopus 로고
    • Providing witness anonymity under peer-to-peer settings
    • B. Zhu, S. Setia, S. Jajodia, and L. Wang, "Providing witness anonymity under peer-to-peer settings," IEEE Trans. Inf. Forens. Security, vol. 5, no. 2, pp. 324-336, 2010.
    • (2010) IEEE Trans. Inf. Forens. Security , vol.5 , Issue.2 , pp. 324-336
    • Zhu, B.1    Setia, S.2    Jajodia, S.3    Wang, L.4
  • 8
    • 77955963220 scopus 로고    scopus 로고
    • Practical robust communication in DHTs tolerating a byzantine adversary
    • M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical robust communication in DHTs tolerating a byzantine adversary," in Proc. ICDCS, 2010, pp. 263-272.
    • (2010) Proc. ICDCS , pp. 263-272
    • Young, M.1    Kate, A.2    Goldberg, I.3    Karsten, M.4
  • 9
    • 74449090467 scopus 로고    scopus 로고
    • Leveraging identity-based cryptography for node ID assignment in structured P2P systems
    • K. R. B. Butler, S. Ryu, P. Traynor, and P. D. McDaniel, "Leveraging identity-based cryptography for node ID assignment in structured P2P systems," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1803-1815, 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.12 , pp. 1803-1815
    • Butler, K.R.B.1    Ryu, S.2    Traynor, P.3    McDaniel, P.D.4
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proc. CRYPTO, 2001, pp. 213-229.
    • (2001) Proc. CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 11
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
    • (1984) Proc. CRYPTO , pp. 47-53
    • Shamir, A.1
  • 13
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. ACM SIGCOMM, 1998, pp. 68-79.
    • (1998) Proc. ACM SIGCOMM , pp. 68-79
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 16
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, 2003.
    • (2003) IEEE Trans. Softw. Eng. , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 17
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
    • (2007) Proc. ASIACRYPT , pp. 200-215
    • Delerablée, C.1
  • 18
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts)," in Proc. EUROCRYPT, 2009, pp. 171-188.
    • (2009) Proc. EUROCRYPT , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 21
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. Menezes, T. Okamoto, and S. A. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Trans. Inf. Theory, vol. 39, no. 5, pp. 1639-1646, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.A.3
  • 22
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • B. Waters, "Efficient identity-based encryption without random oracles," in Proc. EUROCRYPT, 2005, pp. 114-127.
    • (2005) Proc. EUROCRYPT , pp. 114-127
    • Waters, B.1
  • 23
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-based encryption supporting direct/indirect revocation modes
    • N. Attrapadung and H. Imai, "Attribute-based encryption supporting direct/indirect revocation modes," in Proc. IEEE Int. Conf. Image Process. (IMA), 2009, pp. 278-300.
    • (2009) Proc. IEEE Int. Conf. Image Process. (IMA) , pp. 278-300
    • Attrapadung, N.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.