Identity-based construction for secure and efficient handoff authentication schemes in wireless networks
暂无分享,去创建一个
H. Li | J. Cao | Y. H. Zhang | X. F. Chen | H. Li | X. Chen | Y. Zhang | J. Cao
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[3] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[4] Yanghee Choi,et al. Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[7] Souhwan Jung,et al. A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.
[8] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[9] Fuchun Guo,et al. Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.
[10] William A. Arbaugh,et al. Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.
[11] Wei Ren,et al. SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography , 2007, 2007 IEEE International Conference on Communications.
[12] Yi Mu,et al. Efficient generic on-line/off-line (threshold) signatures without key exposure , 2008, Inf. Sci..
[13] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[14] C. Pandu Rangan,et al. Identity Based Online/Offline Encryption Scheme , 2010, IACR Cryptol. ePrint Arch..
[15] Shyhtsun Felix Wu,et al. A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network , 2005, WISA.
[16] Yi Mu,et al. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.
[17] Souhwan Jung,et al. A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6 , 2008, IEICE Trans. Commun..
[18] Hugo Krawczyk,et al. Chameleon Signatures , 2000, NDSS.
[19] Eun-Jun Yoon,et al. Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing , 2010, IEICE Trans. Inf. Syst..
[20] Pin-Han Ho,et al. A Location Privacy Preserving Authentication Scheme in Vehicular Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[21] Shiuh-Jeng Wang,et al. Hierarchical key derivation scheme for group-oriented communication systems , 2010, Int. J. Inf. Technol. Commun. Convergence.
[22] Anand R. Prasad,et al. Fast Authentication for Inter-domain Handover , 2004, ICT.
[23] C. Pandu Rangan,et al. Identity Based Online/Offline Signcryption Scheme , 2010, IACR Cryptol. ePrint Arch..
[24] Joseph K. Liu,et al. An Efficient Identity-Based Online/Offline Encryption Scheme , 2009, ACNS.
[25] Bing He,et al. On secure communication in integrated heterogeneous wireless networks , 2010, Int. J. Inf. Technol. Commun. Convergence.
[26] Amrita Saha,et al. Secure Communication Using Reed-Muller Codes and Partially Balanced Design in Wireless Sensor Network , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.