Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Distributed key management for dynamic groups in MANETs , 2008, Pervasive Mob. Comput..
[2] Tim Howes,et al. Internet X.509 Public Key Infrastructure LDAPv2 Schema , 1999, RFC.
[3] Taylor Yu. The Kerberos Network Authentication Service (Version 5) , 2007 .
[4] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[5] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[6] J. J. Garcia-Luna-Aceves,et al. Non-interactive key establishment in mobile ad hoc networks , 2007, Ad Hoc Networks.
[7] James F. Epperson,et al. An Introduction to Numerical Methods and Analysis , 2001 .
[8] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[9] Zhenfu Cao,et al. Threshold password authentication against guessing attacks in Ad hoc networks , 2007, Ad Hoc Networks.
[10] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[11] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[12] Yueh-Min Huang,et al. A novel secure communication scheme in vehicular ad hoc networks , 2008, Comput. Commun..
[13] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Deep Medhi,et al. A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.
[16] Mohan S. Kankanhalli,et al. Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.
[17] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[18] Kwangjo Kim,et al. Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..
[19] Jongtack Kim,et al. Design of certification authority using secret redistribution and multicast routing in wireless mesh networks , 2009, Comput. Networks.
[20] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[21] Jeong Hyun Yi,et al. On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[22] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.