Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
暂无分享,去创建一个
[1] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[2] Michele Nogueira Lima,et al. Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.
[3] Mingxing He,et al. Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks , 2006, CANS.
[4] Hung-Yu Chien. Practical anonymous user authentication scheme with security proof , 2008, Comput. Secur..
[5] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[6] Yuguang Fang,et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[7] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[8] Hung-Yu Chien. ID-Based Key Agreement with Anonymity for Ad Hoc Networks , 2007, EUC.
[9] Xingwen Zhao,et al. Dynamic asymmetric group key agreement for ad hoc networks , 2011, Ad Hoc Networks.
[10] Ratna Dutta,et al. Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks , 2011, Ad Hoc Networks.
[11] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] Maarit Hietalahti. A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks , 2008, Electron. Notes Theor. Comput. Sci..
[13] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Driss Aboutajdine,et al. An energy efficient clustering protocol for routing in Wireless Sensor Network , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[16] Hung-Yu Chien,et al. Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.
[17] Norihiko Yoshida,et al. Context-aware cluster-based hierarchical protocol for Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[18] Caroline J. Kudla,et al. Special Signature Schemes and Key Agreement Protocols , 2006 .
[19] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[20] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[21] Lung-Chung Li,et al. Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.
[22] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[23] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[24] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[25] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[26] Ren-Junn Hwang,et al. Privacy protection on Vehicular Ad hoc NETworks , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[27] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[28] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[29] Elisavet Konstantinou. Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[30] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[31] Rajesh Krishnan,et al. Optimization algorithms for large self-structuring networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[32] Ali Miri,et al. Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.
[33] Farouk Kamoun,et al. Optimal clustering structures for hierarchical topological design of large computer networks , 1980, Networks.