Authenticated and efficient key management for wireless ad hoc networks
暂无分享,去创建一个
[1] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[2] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[3] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[6] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[7] Sushil Jajodia,et al. Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .
[8] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[9] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[10] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[13] Andy Hopper,et al. Piconet: embedded mobile networking , 1997, IEEE Wirel. Commun..
[14] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.