CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
暂无分享,去创建一个
Yuguang Fang | Weifeng Chen | Yanping Li | Zhiping Cai | Yuguang Fang | Zhiping Cai | Weifeng Chen | Yanping Li
[1] Bing He,et al. An identity-based authentication and key establishment scheme for multi-operator maintained Wireless Mesh Networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[2] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[3] Yuguang Fang,et al. How to secure multi-domain wireless mesh networks , 2010, Wirel. Networks.
[4] Josep Domingo-Ferrer,et al. Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..
[5] Tianhan Gao,et al. Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Hoon Wei Lim,et al. Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[7] Zhoujun Li,et al. Provably secure identity-based authenticated key agreement protocols with malicious private key generators , 2011, Inf. Sci..
[8] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[9] Uyen Trang Nguyen,et al. Fast authentication for mobile clients in wireless mesh networks , 2010, CCECE 2010.
[10] Richard Comley,et al. Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..
[11] Jianhua Li,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.
[12] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[13] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Wenjing Lou,et al. PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[15] Hui Li,et al. Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.
[16] Wenjing Lou,et al. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Li Jianhua,et al. Two-party authenticated key agreement in certificateless public key cryptography , 2007 .
[19] Guomin Yang,et al. Cross-domain password-based authenticated key exchange revisited , 2013, 2013 Proceedings IEEE INFOCOM.
[20] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[21] Zhenfu Cao,et al. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode , 2009, Science in China Series F: Information Sciences.
[22] Sin Ban Ho,et al. An enhanced certificateless authenticated key agreement protocol , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[23] Kyung-Ah Shim. Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .