Aggregate designated verifier signatures and application to secure routing
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[4] Yi Mu,et al. Short (Identity-Based) Strong Designated Verifier Signature Schemes , 2006, ISPEC.
[5] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[6] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[7] Javier Herranz,et al. Efficient Authentication for Reactive Routing Protocols , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[8] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[10] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[13] Levente Buttyán,et al. Towards provable security for ad hoc routing protocols , 2004, SASN '04.
[14] Feng Bao,et al. Sequential aggregate signatures for wireless routing protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[15] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[16] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[19] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[20] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[21] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[24] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[25] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.