Symmetric Threshold Multipath (STM): An online symmetric key management scheme
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[2] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Takashi Nishide,et al. Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs , 2012, J. Inf. Process..
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Dawn Song,et al. Key distribution techniques for sensor networks , 2004 .
[7] Chik How Tan,et al. Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.
[8] Elaine B. Barker,et al. Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes , 2010 .
[9] Wei Ren,et al. HybridS: A Scheme for Secure Distributed Data Storage in WSNs , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[13] Chin-Fu Kuo,et al. A novel key management scheme for wireless embedded systems , 2012, SIAP.
[14] Manish Shrivastava,et al. Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network , 2013 .
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] Sun Qian,et al. A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .
[18] Elaine B. Barker,et al. SP 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[19] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[20] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[21] Yangmin Li,et al. A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network , 2012, 2012 IEEE International Conference on Automation and Logistics.
[22] Takashi Nishide,et al. Threshold ElGamal-based key management scheme for distributed RSUs in VANET , 2011, 2011 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST).
[23] Yang Lu,et al. Threshold Certificate-based Encryption , 2009, J. Softw..
[24] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[25] Imad Mahgoub,et al. HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..
[26] Wan An Xiong,et al. Secure and highly efficient three level key management scheme for MANET , 2011 .
[27] Alok Aggarwal,et al. Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks , 2012, IC3.
[28] Kaoru Kurosawa,et al. Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.
[29] Takashi Ito,et al. A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.