An efficient session key generation for NTDR networks based on bilinear paring
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[3] Hung-Yu Chien,et al. Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.
[4] Jeong Hyun Yi,et al. Robust self-keying mobile ad hoc networks , 2007, Comput. Networks.
[5] Nigel P. Smart,et al. An Identity Based Authentication Key Agreement Protocol Based on Pairing , 2002 .
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[7] Chin-Chen Chang,et al. DH-based communication method for cluster-based ad hoc networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.
[8] Andreas Enge,et al. Provably secure non-interactive key distribution based on pairings , 2006, Discret. Appl. Math..
[9] G. Frey,et al. A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .
[10] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[11] Hung-Yu Chien,et al. Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[12] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[13] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[14] Eric Thompson. MD5 collisions and the impact on computer forensics , 2005, Digit. Investig..
[15] J. Chandra,et al. A cluster based security model for mobile ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[16] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[17] Leonard Barolli,et al. Secure emergency communication of cellular phones in ad hoc mode , 2007, Ad Hoc Networks.
[18] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[19] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[20] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[21] Dong Hoon Lee,et al. ID-based Authenticated Key Agreement for Low-Power Mobile Devices , 2005, ACISP.
[22] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[23] Nigel P. Smart,et al. AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .
[24] Hyunsoo Yoon,et al. On-demand secure routing protocol for ad hoc network using ID based cryptosystem , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[25] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[26] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[27] Paulo S. L. M. Barreto,et al. Efficient Implementation of Pairing-Based Cryptosystems , 2004, Journal of Cryptology.
[28] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[29] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[30] Chien-Chih Wang,et al. Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings , 2008, Comput. Electr. Eng..
[31] R. Ruppe,et al. Near Term Digital Radio (NTDR) system , 1997, MILCOM 97 MILCOM 97 Proceedings.
[32] Xiaofeng Chen,et al. Attack on an ID-based authenticated group key agreement scheme from PKC 2004 , 2004, Inf. Process. Lett..
[33] Kyung-Ah Shim,et al. Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..
[34] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[35] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[36] C. Popescu,et al. A Secure Authenticated Key Agreement Protocol , 2022 .