메뉴 건너뛰기




Volumn 16, Issue 6, 2017, Pages 1530-1543

Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks

Author keywords

Batch identification; game theory; wireless mobile networks

Indexed keywords

AUTHENTICATION; GAME THEORY; MOBILE TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS;

EID: 85027556022     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2016.2604820     Document Type: Article
Times cited : (46)

References (31)
  • 1
    • 84921441831 scopus 로고    scopus 로고
    • Dominating set and network coding-based routing in wireless mesh networks
    • Feb
    • J. Chen, K. He, R. Du, Y. Xiang, and Q. Yuan, "Dominating set and network coding-based routing in wireless mesh networks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 423-433, Feb. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst , vol.26 , Issue.2 , pp. 423-433
    • Chen, J.1    He, K.2    Du, R.3    Xiang, Y.4    Yuan, Q.5
  • 2
    • 84863935030 scopus 로고    scopus 로고
    • Indirect reciprocity security game for large-scale wireless networks
    • Aug
    • L. Xiao, Y. Chen, W. S. Lin, and K. J. R. Liu, "Indirect reciprocity security game for large-scale wireless networks," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 4, pp. 1368-1380, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Secur , vol.7 , Issue.4 , pp. 1368-1380
    • Xiao, L.1    Chen, Y.2    Lin, W.S.3    Liu, K.J.R.4
  • 3
    • 84974824406 scopus 로고    scopus 로고
    • Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks
    • J. Chen, K. He, Q. Yuan, R. Du, and J. Wu, "Distributed greedy coding-aware deterministic routing for multi-flow in wireless networks," Comput. Netw., vol. 105, pp. 194-206, 2016.
    • (2016) Comput. Netw , vol.105 , pp. 194-206
    • Chen, J.1    He, K.2    Yuan, Q.3    Du, R.4    Wu, J.5
  • 4
    • 84975886698 scopus 로고    scopus 로고
    • Mobilityaware caching and computation offloading in 5G ultradense cellular networks
    • M. Chen, Y. Hao, M. Qiu, J. Song, D. Wu, and I. Humar, "Mobilityaware caching and computation offloading in 5G ultradense cellular networks," Sensors, vol. 16, no. 7, pp. 974-986, 2016.
    • (2016) Sensors , vol.16 , Issue.7 , pp. 974-986
    • Chen, M.1    Hao, Y.2    Qiu, M.3    Song, J.4    Wu, D.5    Humar, I.6
  • 5
    • 84952313614 scopus 로고    scopus 로고
    • The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities
    • Nov
    • Y. Liu, D. Bild, R. Dick, Z. Mao, and D. Wallach, "The Mason test: A defense against Sybil attacks in wireless networks without trusted authorities," IEEE Trans. Mobile Comput., vol. 14, no. 11, pp. 2376-2391, Nov. 2015.
    • (2015) IEEE Trans. Mobile Comput , vol.14 , Issue.11 , pp. 2376-2391
    • Liu, Y.1    Bild, D.2    Dick, R.3    Mao, Z.4    Wallach, D.5
  • 6
    • 84953392935 scopus 로고    scopus 로고
    • Softwaredefined mobile networks security
    • M. Chen, Y. Qian, S. Mao, W. Tang, and X. Yang, "Softwaredefined mobile networks security," Mobile Netw. Appl., 2016. [Online]. Available: http://doi:10.1007/s11036-015-0665-5.
    • (2016) Mobile Netw. Appl
    • Chen, M.1    Qian, Y.2    Mao, S.3    Tang, W.4    Yang, X.5
  • 7
    • 84894565582 scopus 로고    scopus 로고
    • Efficient authentication for mobile and pervasive computing
    • Mar
    • B. Alomair and R. Poovendran, "Efficient authentication for mobile and pervasive computing," IEEE Trans. Mobile Comput., vol. 13, no. 3, pp. 496-481, Mar. 2014.
    • (2014) IEEE Trans. Mobile Comput , vol.13 , Issue.3 , pp. 481-496
    • Alomair, B.1    Poovendran, R.2
  • 9
    • 84861148357 scopus 로고    scopus 로고
    • A batch-authenticated and key agreement framework for P2P-based online social networks
    • May
    • L. Y. Yeh, Y. L. Huang, A. Joseph, S. Shieh, and W. Tsaur, "A batch-authenticated and key agreement framework for P2P-based online social networks," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1907-1924, May 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.4 , pp. 1907-1924
    • Yeh, L.Y.1    Huang, Y.L.2    Joseph, A.3    Shieh, S.4    Tsaur, W.5
  • 10
    • 84998890585 scopus 로고    scopus 로고
    • DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments
    • K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments," IEEE Trans. Comput., 2016. [Online]. Available: http:// doi.org/10.1109/TC.2016.2560812
    • (2016) IEEE Trans. Comput
    • He, K.1    Chen, J.2    Du, R.3    Wu, Q.4    Xue, G.5    Zhang, X.6
  • 12
    • 0041863206 scopus 로고
    • Can DSA be improved? Complexity trade-offs with the digital signature standard
    • D. Naccache, D. M'Raihi, S. Vaudenay, and D. Raphaeli, "Can DSA be improved? complexity trade-offs with the digital signature standard," in Proc. EUROCRYPT, 1994, pp. 77-85.
    • (1994) Proc. EUROCRYPT , pp. 77-85
    • Naccache, D.1    M'Raihi, D.2    Vaudenay, S.3    Raphaeli, D.4
  • 13
    • 84883356524 scopus 로고    scopus 로고
    • Batch fully homomorphic encryption over the integers
    • J. Cheon, J. Coron, J. Kim, and M. Lee, "Batch fully homomorphic encryption over the integers," in Proc. EUROCRYPT, 2013, pp. 315-335.
    • (2013) Proc. EUROCRYPT , pp. 315-335
    • Cheon, J.1    Coron, J.2    Kim, J.3    Lee, M.4
  • 14
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signaturebased scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. IEEE INFOCOM, 2008, pp. 1409-1417.
    • (2008) Proc. IEEE INFOCOM , pp. 1409-1417
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 15
    • 51449098979 scopus 로고    scopus 로고
    • An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM, 2008, pp. 246-250.
    • (2008) Proc. IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3    Ho, P.-H.4    Shen, X.S.5
  • 16
    • 84887266426 scopus 로고    scopus 로고
    • B-SPECS+: Batch verification for secure pseudonymous authentication in VANET
    • Nov
    • S. Horng, S. Tzeng, Y. Pan, and P. Fan, "b-SPECS+: Batch verification for secure pseudonymous authentication in VANET," IEEE Trans. Inf. Forensics Secur., vol. 8, no. 11, pp. 1860-1875, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Secur , vol.8 , Issue.11 , pp. 1860-1875
    • Horng, S.1    Tzeng, S.2    Pan, Y.3    Fan, P.4
  • 18
    • 84976428104 scopus 로고    scopus 로고
    • Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
    • Jul
    • S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
    • (2016) IEEE Trans. Image Process , vol.25 , Issue.7 , pp. 3411-3425
    • Hu, S.1    Wang, Q.2    Wang, J.3    Qin, Z.4    Ren, K.5
  • 19
  • 20
    • 38149073980 scopus 로고    scopus 로고
    • Finding invalid signatures in pairing-based bathes
    • Berlin, Germany: Springer
    • L. Law and B. Matt, "Finding invalid signatures in pairing-based bathes," in Cryptography and Coding. Berlin, Germany: Springer, 2007, pp. 34-53.
    • (2007) Cryptography and Coding , pp. 34-53
    • Law, L.1    Matt, B.2
  • 21
    • 78650256851 scopus 로고    scopus 로고
    • Attacking LCCC batch verification of RSA signatures
    • M. Stanek, "Attacking LCCC batch verification of RSA signatures," Int. J. Netw. Secur., vol. 6, no. 2, pp. 238-240, 2008.
    • (2008) Int. J. Netw. Secur , vol.6 , Issue.2 , pp. 238-240
    • Stanek, M.1
  • 22
    • 67049087745 scopus 로고    scopus 로고
    • Identification of multiple invalid signatures in pairingbased batched signatures
    • B. J. Matt, "Identification of multiple invalid signatures in pairingbased batched signatures," in Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, 2009, pp. 337-356.
    • (2009) Proc. 12th Int. Conf. Practice Theory Public Key Cryptography , pp. 337-356
    • Matt, B.J.1
  • 24
    • 84855615935 scopus 로고    scopus 로고
    • On batch verification with group testing for vehicular communications
    • C. Zhang, P. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Netw., vol. 17, no. 8, pp. 1851-1865, 2011.
    • (2011) Wireless Netw , vol.17 , Issue.8 , pp. 1851-1865
    • Zhang, C.1    Ho, P.2    Tapolcai, J.3
  • 25
    • 84880254414 scopus 로고    scopus 로고
    • Toward a secure batch verification with group testing for VANET
    • C. Lee and Y. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Netw., vol. 19, no. 6, pp. 1441-1449, 2013.
    • (2013) Wireless Netw , vol.19 , Issue.6 , pp. 1441-1449
    • Lee, C.1    Lai, Y.2
  • 26
    • 84869480265 scopus 로고    scopus 로고
    • Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
    • J. A. Akinyele, M. Green, S. Hohenberger, and M. W. Pagano, "Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes," in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 474-487.
    • (2012) Proc. ACM Conf. Comput. Commun. Secur , pp. 474-487
    • Akinyele, J.A.1    Green, M.2    Hohenberger, S.3    Pagano, M.W.4
  • 27
    • 84954234227 scopus 로고    scopus 로고
    • Game-theory-based batch identification of invalid signatures in wireless mobile networks
    • J. Chen, Q. Yuan, G. L. Xue, and R. Y. Du, "Game-theory-based batch identification of invalid signatures in wireless mobile networks," in Proc. IEEE INFOCOM, 2015, pp. 262-270.
    • (2015) Proc. IEEE INFOCOM , pp. 262-270
    • Chen, J.1    Yuan, Q.2    Xue, G.L.3    Du, R.Y.4
  • 28
    • 84904439253 scopus 로고    scopus 로고
    • How can botnets cause storms? Understanding the evolution and impact of mobile botnets
    • Z. Lu, W. Wang, and C. Wang, "How can botnets cause storms? Understanding the evolution and impact of mobile botnets," in Proc. IEEE INFOCOM, 2014, pp. 1501-1509.
    • (2014) Proc. IEEE INFOCOM , pp. 1501-1509
    • Lu, Z.1    Wang, W.2    Wang, C.3
  • 29
    • 60549085782 scopus 로고    scopus 로고
    • An em algorithm for Markov modulated Markov processes
    • Feb
    • Y. Ephraim and W. J. J. Roberts, "An EM algorithm for Markov modulated Markov processes," IEEE Trans. Signal Process., vol. 57, no. 2, pp. 463-470, Feb. 2009.
    • (2009) IEEE Trans. Signal Process , vol.57 , Issue.2 , pp. 463-470
    • Ephraim, Y.1    Roberts, W.J.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.