-
1
-
-
84863025251
-
Efficient trust based information sharing schemes over distributed collaborative networks
-
Nov.
-
H. Lin, X. Zhu, C. Zhang, Y. Fang, and Z. Cao, "Efficient trust based information sharing schemes over distributed collaborative networks," in Proc. IEEE Military Commun. Conf. (MILCOM), Nov. 2011.
-
(2011)
Proc. IEEE Military Commun. Conf. (MILCOM)
-
-
Lin, H.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
Cao, Z.5
-
2
-
-
67650660211
-
Trust management for secure information flows
-
M. Srivatsa, S. Balfe, K. G. Paterson, and P. Rohatgi, "Trust management for secure information flows," in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 175-188.
-
(2008)
Proc. ACM Conf. Comput. Commun. Security
, pp. 175-188
-
-
Srivatsa, M.1
Balfe, S.2
Paterson, K.G.3
Rohatgi, P.4
-
3
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 417-426.
-
(2008)
Proc. ACM Conf. Comput. Commun. Security
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
4
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
5
-
-
77953306183
-
An opportunistic batch bundle authentication scheme for energy constrained DTNs
-
H. Zhu, X. Lin, R. Lu, X. Shen, D. Xing, and Z. Cao, "An opportunistic batch bundle authentication scheme for energy constrained DTNs," in Proc. IEEE INFOCOM, 2010, pp. 605-613.
-
(2010)
Proc. IEEE INFOCOM
, pp. 605-613
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Shen, X.4
Xing, D.5
Cao, Z.6
-
6
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
S.-B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks," in Proc. ACM MobiHoc, 2007, pp. 150-159.
-
(2007)
Proc. ACM MobiHoc
, pp. 150-159
-
-
Lee, S.-B.1
Pan, G.2
Park, J.-S.3
Gerla, M.4
Lu, S.5
-
7
-
-
77952652973
-
Providing witness anonymity under peer-to-peer settings
-
B. Zhu, S. Setia, S. Jajodia, and L. Wang, "Providing witness anonymity under peer-to-peer settings," IEEE Trans. Inf. Forens. Security, vol. 5, no. 2, pp. 324-336, 2010.
-
(2010)
IEEE Trans. Inf. Forens. Security
, vol.5
, Issue.2
, pp. 324-336
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
Wang, L.4
-
8
-
-
77955963220
-
Practical robust communication in DHTs tolerating a byzantine adversary
-
M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical robust communication in DHTs tolerating a byzantine adversary," in Proc. ICDCS, 2010, pp. 263-272.
-
(2010)
Proc. ICDCS
, pp. 263-272
-
-
Young, M.1
Kate, A.2
Goldberg, I.3
Karsten, M.4
-
9
-
-
74449090467
-
Leveraging identity-based cryptography for node ID assignment in structured P2P systems
-
K. R. B. Butler, S. Ryu, P. Traynor, and P. D. McDaniel, "Leveraging identity-based cryptography for node ID assignment in structured P2P systems," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1803-1815, 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.12
, pp. 1803-1815
-
-
Butler, K.R.B.1
Ryu, S.2
Traynor, P.3
McDaniel, P.D.4
-
10
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proc. CRYPTO, 2001, pp. 213-229.
-
(2001)
Proc. CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
11
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
-
(1984)
Proc. CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
34548774576
-
Multidimensional range query over encrypted data
-
E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig, "Multidimensional range query over encrypted data," in Proc. IEEE Symp. Security Privacy, 2007, pp. 350-364.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, H.T.-H.3
Song, D.X.4
Perrig, A.5
-
13
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. ACM SIGCOMM, 1998, pp. 68-79.
-
(1998)
Proc. ACM SIGCOMM
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
15
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEE INFOCOM, 1999, pp. 708-716.
-
(1999)
Proc. IEEE INFOCOM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.A.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
16
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, 2003.
-
(2003)
IEEE Trans. Softw. Eng.
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
17
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, pp. 200-215.
-
(2007)
Proc. ASIACRYPT
, pp. 200-215
-
-
Delerablée, C.1
-
18
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts)," in Proc. EUROCRYPT, 2009, pp. 171-188.
-
(2009)
Proc. EUROCRYPT
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
19
-
-
44349085943
-
Randomness re-use in multirecipient encryption schemas
-
M. Bellare, A. Boldyreva, and J. Staddon, "Randomness re-use in multirecipient encryption schemas," in Proc. Public Key Cryptography (PKC), 2003, pp. 85-99.
-
(2003)
Proc. Public Key Cryptography (PKC)
, pp. 85-99
-
-
Bellare, M.1
Boldyreva, A.2
Staddon, J.3
-
21
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S. A. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Trans. Inf. Theory, vol. 39, no. 5, pp. 1639-1646, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.A.3
-
22
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
B. Waters, "Efficient identity-based encryption without random oracles," in Proc. EUROCRYPT, 2005, pp. 114-127.
-
(2005)
Proc. EUROCRYPT
, pp. 114-127
-
-
Waters, B.1
-
23
-
-
72449201970
-
Attribute-based encryption supporting direct/indirect revocation modes
-
N. Attrapadung and H. Imai, "Attribute-based encryption supporting direct/indirect revocation modes," in Proc. IEEE Int. Conf. Image Process. (IMA), 2009, pp. 278-300.
-
(2009)
Proc. IEEE Int. Conf. Image Process. (IMA)
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
|