메뉴 건너뛰기




Volumn 26, Issue , 2015, Pages 262-270

Game-theory-based batch identification of invalid signatures in wireless mobile networks

Author keywords

Batch identification; game theory; wireless mobile networks

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS;

EID: 84954234227     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2015.7218390     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 2
    • 84904438201 scopus 로고    scopus 로고
    • Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
    • P. Hu, K. Xing, X. Cheng, H. Wei, and H. Zhu, "Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks," in Proceedings of IEEE INFOCOM, 2014.
    • (2014) Proceedings of IEEE INFOCOM
    • Hu, P.1    Xing, K.2    Cheng, X.3    Wei, H.4    Zhu, H.5
  • 5
    • 78751657441 scopus 로고    scopus 로고
    • Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
    • J. Huang, L. Yeh, and H. Chien, "Abaka: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," in IEEE Transactions on vehicular technology, 2011.
    • (2011) IEEE Transactions on Vehicular Technology
    • Huang, J.1    Yeh, L.2    Chien, H.3
  • 8
    • 77953317265 scopus 로고    scopus 로고
    • Identification of multiple invalid signatures in pairing-based batched signatures
    • B. J. Matt, "Identification of multiple invalid signatures in pairing-based batched signatures," in PKC 2009, 2009.
    • (2009) PKC 2009
    • Matt, B.J.1
  • 9
    • 84869480265 scopus 로고    scopus 로고
    • Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
    • J. A. Akinyele, M. Green, S. Hohenberger, and M. W. Pagano, "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes," in Proceedings of ACM CCS, 2012.
    • (2012) Proceedings of ACM CCS
    • Akinyele, J.A.1    Green, M.2    Hohenberger, S.3    Pagano, M.W.4
  • 10
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communications
    • C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," in Wireless Networks, 2011.
    • (2011) Wireless Networks
    • Zhang, C.1    Ho, P.2    Tapolcai, J.3
  • 12
    • 0041863206 scopus 로고
    • Can dsa be improved? Complexity trade-offs with the digital signature standard
    • Naccache, M'Raihi, Vaudenay, and Raphaeli, "Can dsa be improved? complexity trade-offs with the digital signature standard," in Proceedings of EUROCRYPT, 1994.
    • (1994) Proceedings of EUROCRYPT
    • Naccache1    M'Raihi2    Vaudenay3    Raphaeli4
  • 13
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signaturebased scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proceedings of IEEE INFOCOM, 2008.
    • (2008) Proceedings of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 14
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks." in Proceedings of IEEE INFOCOM, 2008.
    • (2008) Proceedings of IEEE INFOCOM
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.S.5
  • 16
    • 84954294704 scopus 로고    scopus 로고
    • Finding invalid signatures in pairing-based bathes
    • L. Law and B. Matt, "Finding invalid signatures in pairing-based bathes," in Cryptography and Coding, 2007.
    • (2007) Cryptography and Coding
    • Law, L.1    Matt, B.2
  • 19
    • 84880254414 scopus 로고    scopus 로고
    • Toward a secure batch verification with group testing for vanet
    • C. Lee and Y. Lai, "Toward a secure batch verification with group testing for vanet," in Wireless Networks, 2013.
    • (2013) Wireless Networks
    • Lee, C.1    Lai, Y.2
  • 21
    • 77953306183 scopus 로고    scopus 로고
    • An opportunistic batch bundle authentication scheme for energy constrained dtns
    • H. Zhu, X. Lin, R. Lu, X. S. Shen, and Z. Cao, "An opportunistic batch bundle authentication scheme for energy constrained dtns," in Proceedings of IEEE INFOCOM, 2010.
    • (2010) Proceedings of IEEE INFOCOM
    • Zhu, H.1    Lin, X.2    Lu, R.3    Shen, X.S.4    Cao, Z.5
  • 22
    • 84904439253 scopus 로고    scopus 로고
    • How can botnets cause storms? Understanding the evolution and impact of mobile botnets
    • Z. Lu, W. Wang, and C. Wang, "How can botnets cause storms? understanding the evolution and impact of mobile botnets," in Proceedings of IEEE INFOCOM, 2014.
    • (2014) Proceedings of IEEE INFOCOM
    • Lu, Z.1    Wang, W.2    Wang, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.