메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 336-345

On the utility of distributed cryptography in P2P and MANETs: The case of membership control

Author keywords

Access control; Authentication; Availability; Control systems; Cryptography; Fault tolerance; Peer to peer computing; Robust control; Security; Web and internet services

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; AVAILABILITY; CONTROL SYSTEMS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANCE; INTERNET; MOBILE AD HOC NETWORKS; MOBILE SECURITY; NETWORK PROTOCOLS; ROBUST CONTROL;

EID: 84943517115     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2003.1249783     Document Type: Conference Paper
Times cited : (108)

References (29)
  • 1
    • 0001849893 scopus 로고    scopus 로고
    • Efficient generation of shared rsa keys
    • D. Boneh and M. Franklin. Efficient generation of shared rsa keys. In CRYPTO, 1997.
    • (1997) CRYPTO
    • Boneh, D.1    Franklin, M.2
  • 2
    • 0022199386 scopus 로고
    • Verifiable secret sharing and achieving simultaneity in the presence of faults
    • B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In FOCS, 1985.
    • (1985) FOCS
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 3
    • 0001558864 scopus 로고
    • Society and group oriented cryptosystems
    • Y. Desmedt. Society and group oriented cryptosystems. In CRYPTO, 1987.
    • (1987) CRYPTO
    • Desmedt, Y.1
  • 6
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur. The sybil attack. In IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.R.1
  • 7
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In FOCS, 1987.
    • (1987) FOCS
    • Feldman, P.1
  • 8
    • 0031375570 scopus 로고    scopus 로고
    • Optimal-resilience proactive public-key cryptosystems
    • Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In FOCS, 1997.
    • (1997) FOCS
    • Frankel, Y.1    Gemmell, P.2    MacKenzie, P.D.3    Yung, M.4
  • 11
    • 84943526812 scopus 로고    scopus 로고
    • Gnut v0.4.21, http://schnarff.com/gnutelladev/source/gnut.
    • Gnut V0.4.21
  • 12
    • 0000299804 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In CRYPTO, 1995.
    • (1995) CRYPTO
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 17
    • 1842643245 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In IEEE ICNP, 2001.
    • (2001) IEEE ICNP
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 19
    • 0033351734 scopus 로고    scopus 로고
    • Bounds and techniques for efficient redistribution of secret shaers to new access structures
    • K. Martin, R. Safavi-Naini, and H. Wang. Bounds and techniques for efficient redistribution of secret shaers to new access structures. The Computer Journal, 1999.
    • (1999) The Computer Journal
    • Martin, K.1    Safavi-Naini, R.2    Wang, H.3
  • 22
    • 84943524982 scopus 로고    scopus 로고
    • OpenSSL Project, http://www.openssl.org/.
  • 23
    • 0000135789 scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. P. Pedersen. A threshold cryptosystem without a trusted party. In EUROCRYPT, 1991.
    • (1991) EUROCRYPT
    • Pedersen, T.P.1
  • 24
    • 84943563353 scopus 로고    scopus 로고
    • Peer Group Admission Control Project, http://sconce.ics.uci.edu/gac.
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2), 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11), 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11
    • Shamir, A.1
  • 27
    • 0001000209 scopus 로고    scopus 로고
    • Practical threshold signatures
    • V. Shoup. Practical threshold signatures. In EUROCRYPT, 2000.
    • (2000) EUROCRYPT
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.