An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
暂无分享,去创建一个
[1] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[2] Karim Konate,et al. Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.
[3] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Huaqun Wang,et al. Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model , 2011, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks.
[5] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[6] Sahadeo Padhye,et al. An ID-based signature scheme from bilinear pairing based on k-plus problem , 2011 .
[7] Mike Burmester,et al. On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.
[8] Jiankun Hu,et al. A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[9] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[10] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[11] Jiankun Hu,et al. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey , 2011, Comput. J..
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Yongguang Zhang,et al. Security in Mobile Ad-Hoc Networks , 2005 .
[14] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[15] Christof Paar,et al. On digital signatures in ad hoc networks , 2005, Eur. Trans. Telecommun..
[16] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.