Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Networks
暂无分享,去创建一个
[1] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[2] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[3] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Kenneth G. Paterson,et al. Trust management for secure information flows , 2008, CCS.
[8] Ian Goldberg,et al. Practical Robust Communication in DHTs Tolerating a Byzantine Adversary , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[9] Sushil Jajodia,et al. Providing Witness Anonymity Under Peer-to-Peer Settings , 2010, IEEE Transactions on Information Forensics and Security.
[10] Hideki Imai,et al. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.
[11] Yuguang Fang,et al. Efficient trust based information sharing schemes over distributed collaborative networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[12] Brent Waters,et al. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.
[13] Cécile Delerablée,et al. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.
[14] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[15] Patrick Traynor,et al. Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems , 2009, IEEE Trans. Parallel Distributed Syst..
[16] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[17] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[18] Songwu Lu,et al. Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2007, IEEE Transactions on Vehicular Technology.
[19] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[21] Xiaodong Lin,et al. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs , 2010, 2010 Proceedings IEEE INFOCOM.