RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
暂无分享,去创建一个
[1] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[2] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[3] Gilles Brassard,et al. Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.
[4] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[5] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[6] Jeong Hyun Yi,et al. On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[7] Panagiotis Papadimitratos,et al. Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[8] Levent Ertaul,et al. ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I) , 2005, NETWORKING.
[9] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[10] L. Ertaul,et al. Security of ad hoc networks and threshold cryptography , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.
[11] Joonsang Baek,et al. Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[12] W.A. Arbaugh. Wireless Security Is Different , 2003, Computer.
[13] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.