A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks
暂无分享,去创建一个
Tharam S. Dillon | Song Han | Biming Tian | T. Dillon | Song Han | B. Tian
[1] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[2] Moni Naor,et al. Efficient trace and revoke schemes , 2000, International Journal of Information Security.
[3] Yuan-Shun Dai,et al. A Robust and Stateless Self-Healing Group Key Management Scheme , 2006, 2006 International Conference on Communication Technology.
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Alfredo De Santis,et al. Design of Self-Healing Key Distribution Schemes , 2004, Des. Codes Cryptogr..
[7] Albert Y. Zomaya,et al. Secure localization in wireless sensor networks , 2007 .
[8] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[9] Ali Miri,et al. Self-healing Group Key Distribution , 2005, Int. J. Netw. Secur..
[10] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[11] Xuemin Shen,et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.
[12] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[13] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[14] Sourav Mukhopadhyay,et al. Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[15] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Amos Fiat,et al. Dynamic Traitor Tracing , 2001, Journal of Cryptology.
[17] Jessica Staddon,et al. Sliding-window self-healing key distribution , 2003, SSRS '03.
[18] Germán Sáez. Self-healing Key Distribution Schemes with Sponsorization , 2005, Communications and Multimedia Security.
[19] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[20] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[21] Ying Wang,et al. An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..
[22] Wei-Chi Ku,et al. An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.
[23] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Germán Sáez. On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.