Multi-party encryption (MPE): secure communications in delay tolerant networks
暂无分享,去创建一个
[1] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[2] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[3] Zhengyi Le,et al. EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments , 2011, Secur. Commun. Networks.
[4] Tassos Dimitriou,et al. Multi-Party Trust Computation in Decentralized Environments , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[5] Jonathan Katz,et al. Threshold Cryptosystems Based on Factoring , 2002, ASIACRYPT.
[6] Jing Deng,et al. A Distributed Public Key Caching Scheme in Large Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[7] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[8] H. Cruickshank,et al. Security analysis for Delay/Disruption Tolerant satellite and sensor networks , 2009, 2009 International Workshop on Satellite and Space Communications.
[9] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[10] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[13] Shlomi Dolev,et al. Efficient private multi-party computations of trust in the presence of curious and malicious users , 2014, Journal of Trust Management.
[14] Gene Tsudik,et al. Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[15] Mohit Jain,et al. Notice of Violation of IEEE Publication Principles A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks , 2009 .
[16] Sanjay Kumar Madria,et al. Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[17] S. Nedevschi,et al. Hierarchical identity based cryptography for end-to-end security in DTNs , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Sanjay Kumar Madria,et al. SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.
[20] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[21] Paul F. Syverson,et al. Private Web Browsing , 1997, J. Comput. Secur..
[22] Alfred Menezes,et al. On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.
[23] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[24] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[25] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[26] Sokol Kosta,et al. Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[27] Kenneth H. Rosen,et al. Discrete Mathematics and its applications , 2000 .