A Certificateless Key Management Scheme in Mobile Ad Hoc Networks
暂无分享,去创建一个
Ze Wang | Yunlong Wang | Wenju Liu | Lu Li | Wenju Liu | Ze Wang | Yunlong Wang | Lung-Chung Li
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[3] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[6] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.
[7] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[8] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[9] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[10] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[11] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[12] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..