A three round authenticated group key agreement protocol for ad hoc networks
暂无分享,去创建一个
Valérie Issarny | Daniele Sacchetti | Raghav Bhaskar | Daniel Augot | V. Issarny | D. Augot | Raghav Bhaskar | Daniel C. Sacchetti
[1] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[2] Colin Boyd,et al. Round-Optimal Contributory Conference Key Agreement , 2003, Public Key Cryptography.
[3] Emmanuel Bresson,et al. Constant Round Authenticated Group Key Agreement via Distributed Computation , 2004, Public Key Cryptography.
[4] Emmanuel Bresson,et al. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions , 2002, EUROCRYPT.
[5] Gruia-Catalin Roman,et al. Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[6] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[7] Dongho Won,et al. DDH-based Group Key Agreement for Mobile Computing , 2007 .
[8] Emmanuel Bresson,et al. Provably authenticated group Diffie-Hellman key exchange , 2001, CCS '01.
[9] Jonathan Katz,et al. Scalable Protocols for Authenticated Group Key Exchange , 2003, CRYPTO.
[10] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[11] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[12] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[13] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[14] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[17] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[18] Gene Tsudik,et al. Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.
[19] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[20] Gurdip Singh,et al. Leader Election in Complete Networks , 1997, SIAM J. Comput..
[21] Nitin H. Vaidya,et al. Leader election algorithms for mobile ad hoc networks , 2000, DIALM '00.
[22] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[23] Huaxiong Wang,et al. Malleability attacks on multi-party key agreement protocols , 2004 .
[24] Emmanuel Bresson,et al. Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case , 2001, ASIACRYPT.
[25] Serge Vaudenay,et al. Authenticated Multi-Party Key Agreement , 1996, ASIACRYPT.
[26] Valérie Issarny,et al. AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[27] Jonathan Katz,et al. Modeling insider attacks on group key-exchange protocols , 2005, CCS '05.
[28] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[29] Valérie Issarny,et al. An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[30] Ratna Dutta,et al. Dynamic Group Key Agreement in Tree-Based Setting , 2005, ACISP.