Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Li Gong,et al. A matrix key-distribution scheme , 2005, Journal of Cryptology.
[3] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[4] Mahalingam Ramkumar,et al. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[5] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[6] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[7] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[8] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[9] Hideki Imai,et al. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.
[10] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[11] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[12] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[13] Bennet S. Yee,et al. Dyad : a system for using physically secure coprocessors , 1991 .
[14] M. Ramkumar. Securing Ad Hoc Networks with "Asymmetric" Probabilistic Key Predistribution Schemes , 2006, 2006 IEEE Information Assurance Workshop.
[15] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[16] Martin E. Dyer,et al. On key storage in secure networks , 1995, Journal of Cryptology.
[17] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[18] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[19] Don Davis,et al. Network security via private-key certificates , 1990, OPSR.
[20] Mahalingam Ramkumar,et al. An efficient random key pre-distribution scheme , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[21] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[22] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..