Distributed Key Management Scheme Based on CL-PKC in P2P Networks
暂无分享,去创建一个
Chen Liang | Zhongwen Li | Zhibin Xu | Chen Liang | Zhongwen Li | Zhibin Xu
[1] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[2] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[3] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[4] Hamid R. Nemati,et al. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .
[5] Ling Liu,et al. A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[6] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[7] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] LU Jian-de. P2P Reputation Model Based on Trust and Recommendation , 2009 .
[10] Chik How Tan,et al. Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.
[11] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.