메뉴 건너뛰기




Volumn , Issue , 2003, Pages 354-357

Securing authentication and privacy in ad hoc partitioned networks

Author keywords

Ad hoc networks; Authentication; Certification; Communication system security; Information security; Intelligent networks; Military communication; Privacy; Public key; Wireless communication

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; DATA PRIVACY; INTELLIGENT NETWORKS; INTERNET; MILITARY COMMUNICATIONS; SECURITY OF DATA; WIRELESS AD HOC NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84943812292     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINTW.2003.1210185     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 2
    • 0002181960 scopus 로고
    • Digital multisignatures
    • H. Baker and F.C. Piper, Claredon Press
    • C. Boyd. Digital multisignatures. IMA Conference on Cryptography and Coding, H. Baker and F.C. Piper, Claredon Press, pp 241-246,1986.
    • (1986) IMA Conference on Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 3
    • 84943764832 scopus 로고
    • Broadcast interactive proofs
    • Eurocrypt 91, D.W. Davies, Springer-Verlag
    • M. Burmester and Y. Desmedt. Broadcast interactive proofs. Eurocrypt 91, Lecture Notes in Computer Science 547, D.W. Davies, Springer-Verlag, pp 81-95,1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 81-95
    • Burmester, M.1    Desmedt, Y.2
  • 4
    • 84956862121 scopus 로고    scopus 로고
    • Secure communication in an unknown network using certificates
    • Advances in Cryptology Asiacrypt '99, Springer-Berlin
    • M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. Advances in Cryptology Asiacrypt '99, Lecture Notes in Computer Science 1716, Springer-Berlin, pp 274-287,1999.
    • (1999) Lecture Notes in Computer Science , vol.1716 , pp. 274-287
    • Burmester, M.1    Desmedt, Y.2
  • 10
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology CRYPTO '86, Springer Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology CRYPTO '86, Lecture Notes in Computer Science, Springer Verlag, 263:186-194,1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 13
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proofsystems
    • S. Goldwasser, S. Micali and C. Rackoff. The knowledge complexity of interactive proofsystems. SIAM Journal of Computing, 18(1):186-208,1989.
    • (1989) SIAM Journal of Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 14
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • H. Hezberg, D. Jarecki, H. Krawzyk and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. Crypto '95, pp 339-352, 1995.
    • (1995) Crypto '95 , pp. 339-352
    • Hezberg, H.1    Jarecki, D.2    Krawzyk, H.3    Yung, M.4
  • 16
    • 0034545825 scopus 로고    scopus 로고
    • Sending messages to mobile users in disconnected ad hoc wireless networks
    • Q. Li and D. Rus. Sending messages to mobile users in disconnected ad hoc wireless networks. In proceedings of ACM MOBICOM '00, pp 44-55, 2000.
    • (2000) Proceedings of ACM MOBICOM '00 , pp. 44-55
    • Li, Q.1    Rus, D.2
  • 19
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the rampart tool kit
    • M. Reiter. Distributing trust with the rampart tool kit. Communications of the ACM, 39(4):71-74, 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.4 , pp. 71-74
    • Reiter, M.1
  • 20
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30,1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.