On Dynamic Distribution of Private Keys over MANETs
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Javier Herranz Sotoca,et al. Distributed Key Generation for Id-Based Schemes , 2004 .
[3] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] Jeong Hyun Yi,et al. Efficient node admission for short-lived mobile ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[5] Guang Gong,et al. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .
[6] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] Giovanni Di Crescenzo,et al. Threshold Cryptography for Mobile Ad Hoc Networks , 2004, SCN.
[9] Jie Li,et al. Performance study of multiple route dynamic source routing protocols for mobile ad hoc networks , 2005, J. Parallel Distributed Comput..
[10] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[11] Giovanni Di Crescenzo,et al. Improved topology assumptions for threshold cryptography in mobile ad hoc networks , 2005, SASN '05.
[12] Jeong Hyun Yi,et al. Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.
[13] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[14] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[15] Ernest F. Brickell,et al. Some Ideal Secret Sharing Schemes , 1990, EUROCRYPT.