메뉴 건너뛰기




Volumn , Issue , 2015, Pages

D2D group communications security

Author keywords

Device to Device communications; Identity Based Encryption (IBE); LTE; Security

Indexed keywords

CELLULAR RADIO SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; RADIO COMMUNICATION;

EID: 84962276773     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOTERE.2015.7293504     Document Type: Conference Paper
Times cited : (20)

References (27)
  • 2
    • 84958542525 scopus 로고    scopus 로고
    • Hybrid model for LTE network-assisted D2D communications
    • Springer International Publishing
    • G. T, Thouraya, S. Tsang Kwong U and A. Hossam; "Hybrid Model for LTE Network-Assisted D2D Communications", ADHOC-NOW, Springer International Publishing, pp. 100-113, 2014.
    • (2014) ADHOC-NOW , pp. 100-113
    • Thouraya G, T.1    Tsang, S.2    Kwong, U.3    Hossam, A.4
  • 3
    • 84879309596 scopus 로고    scopus 로고
    • Solving the data overload: Device-to-device bearer control architecture for cellular data offloading
    • M. J. Yang, S. Y. Lim, H. J. Park, N. H. Park, Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Veh. Technol. Mag. 8 (1), pp. 31-39, 2013.
    • (2013) IEEE Veh. Technol. Mag. , vol.8 , Issue.1 , pp. 31-39
    • Yang, M.J.1    Lim, S.Y.2    Park, H.J.3    Park, N.H.4
  • 4
    • 84858407853 scopus 로고    scopus 로고
    • Performance analysis of a distributed resource allocation scheme for D2D communications
    • M. Belleschi, G. Fodor, A. Abrardo, "Performance analysis of a distributed resource allocation scheme for D2D communications", In IEEE GLOBECOM Workshops 2011, pp. 358-362, 2011.
    • (2011) IEEE GLOBECOM Workshops , pp. 358-362
    • Belleschi, M.1    Fodor, G.2    Abrardo, A.3
  • 5
    • 78650733522 scopus 로고    scopus 로고
    • Efficient resource allocation for device-to-device communication underlaying LTE network
    • Zulhasnine, M.; Changcheng Huang; Srinivasan, A., "Efficient resource allocation for device-to-device communication underlaying LTE network", WiMob, pp. 368-375, 2010.
    • (2010) WiMob , pp. 368-375
    • Zulhasnine, M.1    Huang, C.2    Srinivasan, A.3
  • 8
    • 84949500848 scopus 로고    scopus 로고
    • Security architecture
    • 3GPP, TS 33. 401 v. 12. 9. 0, Sept
    • 3GPP, TS 33. 401, v. 12. 9. 0 "Security Architecture", Rel. 12, Sept. 2013.
    • (2013) Rel. 12
  • 12
    • 84949502253 scopus 로고    scopus 로고
    • Study on security issues to support proximity services (ProSe)
    • 3GPP TR 33. 833 v1. 2. 0, Nov
    • 3GPP TR 33. 833 v1. 2. 0: "Study on Security issues to support Proximity Services (ProSe)", Release 13, Nov. 2014.
    • (2014) Release 13
  • 17
    • 38049004199 scopus 로고    scopus 로고
    • Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts
    • E Kiltz. "Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts". Cryptology ePrint Archive, 2006.
    • (2006) Cryptology EPrint Archive
    • Kiltz, E.1
  • 18
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. J. F. (ed.)
    • B Waters. Efficient identity-based encryption without random oracles. In: Cramer, R. J. F. (ed.) EUROCRYPT, 3494: 114-127, 2005.
    • (2005) EUROCRYPT , vol.3494 , pp. 114-127
    • Waters, B.1
  • 21
    • 84912096182 scopus 로고    scopus 로고
    • Secure group communication based on elliptic curve cryptography
    • M. Manisha and M. Rajesh. "Secure Group Communication based on Elliptic Curve Cryptography". Transactions on Networks and Communications, v. 2, n. 1, pp. 1-26, 2014.
    • (2014) Transactions on Networks and Communications , vol.2 , Issue.1 , pp. 1-26
    • Manisha, M.1    Rajesh, M.2
  • 23
    • 4544385042 scopus 로고    scopus 로고
    • An authenticated broadcasting scheme for wireless ad-hoc network
    • Miri, M. J.; "An authenticated broadcasting scheme for wireless ad-hoc network". in Proc. CNSR 2004. IEEE Computer Society, 69-74, 2004.
    • (2004) Proc. CNSR 2004. IEEE Computer Society , pp. 69-74
    • Miri, M.J.1
  • 24
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad-hoc network routing protocols
    • Miri, M. J.;"Efficient identity-based security schemes for ad-hoc network routing protocols". Ad Hoc Networks, 309-317, 2005.
    • (2005) Ad Hoc Networks , pp. 309-317
    • Miri, M.J.1
  • 25
    • 58449126665 scopus 로고    scopus 로고
    • An identity-based broadcast encryption protocol for ad hoc networks
    • L. Zhang, Y. H., "An identity-based broadcast encryption protocol for ad hoc networks". Young Compiter Scientists, International Conference for, 1619-1623, 2008.
    • (2008) Young Compiter Scientists, International Conference for , pp. 1619-1623
    • Zhang, L.1
  • 26
    • 34548839108 scopus 로고    scopus 로고
    • Improved id-based security framework for ad-hoc network
    • Lin, Y. C., "Improved id-based security framework for ad-hoc network". Ad Hoc Networks, 47-60, 2008.
    • (2008) Ad Hoc Networks , pp. 47-60
    • Lin, Y.C.1
  • 27
    • 33646950088 scopus 로고    scopus 로고
    • Constant-round contributory group key agreement for ad-hoc networks
    • IEEE Computer Society Press
    • P. Zhang, C. Y., "Constant-round contributory group key agreement for ad-hoc networks". in Proc. IEEE Wireless Communications, Networking and mobile Computing. IEEE Computer Society Press, 2005.
    • (2005) Proc. IEEE Wireless Communications, Networking and Mobile Computing
    • Zhang, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.