메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 326-335

Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach

Author keywords

Ad hoc networks; Computer networks; Computer science; Cryptographic protocols; Information systems; Intelligent networks; Network servers; Peer to peer computing; Public key cryptography; Secure storage

Indexed keywords

AD HOC NETWORKS; COMPUTER NETWORKS; COMPUTER SCIENCE; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION SYSTEMS; INTELLIGENT NETWORKS; NETWORK PROTOCOLS; PEER TO PEER NETWORKS; PUBLIC KEY CRYPTOGRAPHY; SECURE COMMUNICATION; SERVERS; TELECOMMUNICATION NETWORKS;

EID: 84943553152     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2003.1249782     Document Type: Conference Paper
Times cited : (270)

References (26)
  • 2
    • 84943558038 scopus 로고    scopus 로고
    • Constructing Disjoint Paths for Secure Communication
    • to appear
    • A. Bagchi, A. Chaudhary, M. Goodrich, and S. Xu. Constructing Disjoint Paths for Secure Communication. DISC'03, to appear.
    • DISC'03
    • Bagchi, A.1    Chaudhary, A.2    Goodrich, M.3    Xu, S.4
  • 6
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev. The Byzantine generals strike again. In J. of Algorithms, 3:14-30, 1982.
    • (1982) J. of Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 7
    • 84888077711 scopus 로고    scopus 로고
    • Perfectly secure message transmission revisited
    • Advances in Cryptology EUROCRYPT '02, Springer-Verlag
    • Y. Desmedt and Y. Wang. Perfectly secure message transmission revisited. In Advances in Cryptology EUROCRYPT '02, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science (LNCS)
    • Desmedt, Y.1    Wang, Y.2
  • 8
    • 0027341860 scopus 로고
    • Perfectly Secure Message Transmission
    • D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly Secure Message Transmission. JACM, (40)1, 1993, pp 17-47.
    • (1993) JACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 9
    • 51249175955 scopus 로고
    • Families of Finite Sets in Which no Set Is Covered by the Union of r Others
    • P. Erdos, P. Frankl, and Z. Furedi. Families of Finite Sets in Which no Set Is Covered by the Union of r Others. Israel J. Math. 51(1985), 75-89.
    • (1985) Israel J. Math. , vol.51 , pp. 75-89
    • Erdos, P.1    Frankl, P.2    Furedi, Z.3
  • 11
    • 0003640244 scopus 로고    scopus 로고
    • Secure communincation in minimal connectivity models
    • M. Franklin and R. Wright. Secure communincation in minimal connectivity models. In Journal of Cryptology, 13(1):9-30, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 9-30
    • Franklin, M.1    Wright, R.2
  • 13
    • 0027617271 scopus 로고
    • Increasing Availability and Security of an Authentication Service
    • L. Gong. Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications, 11(5):657-662, 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 16
    • 85023433586 scopus 로고
    • Generalized Linear Threshold Scheme
    • Advances in Cryptology - CRYPTO'84
    • S. Kothari. Generalized Linear Threshold Scheme. Advances in Cryptology - CRYPTO'84, LNCS 196, pp 231-241, 1984.
    • (1984) LNCS , vol.196 , pp. 231-241
    • Kothari, S.1
  • 20
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. Needham and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. In Commuinications of the ACM 21(12): 993-999, 1978.
    • (1978) Commuinications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 21
    • 0023247970 scopus 로고
    • Efficient and Timely Mutual Authentication
    • D. Otway, O. Rees, Efficient and Timely Mutual Authentication, Operating Systems Review, 21 (1987), 8-10.
    • (1987) Operating Systems Review , vol.21 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 25
    • 0000589357 scopus 로고    scopus 로고
    • Some New Bounds for Cover-Free Families
    • D. Stinson and R. Wei, Some New Bounds for Cover-Free Families. In J. Combin. Theory A, 90(2000), 224-234.
    • (2000) J. Combin. Theory A , vol.90 , pp. 224-234
    • Stinson, D.1    Wei, R.2
  • 26
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Comm. ACM, 22(11):612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.