A key management and secure routing integrated framework for Mobile Ad-hoc Networks
暂无分享,去创建一个
[1] Hyunsoo Yoon,et al. On-demand secure routing protocol for ad hoc network using ID based cryptosystem , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[2] Wonjun Lee,et al. LSRP: A Lightweight Secure Routing Protocol with Low Cost for Ad-Hoc Networks , 2005, ICOIN.
[3] Akshai Aggarwal,et al. Against mobile attacks in Mobile Ad-hoc Networks , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[4] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[5] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[6] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Jouni Karvo,et al. A Deployment Tool for Public Safety Ad-hoc Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Hung-Yu Chien,et al. Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.
[10] Yuchen Zhang,et al. Identity-Based Threshold Key Management for Ad Hoc Networks , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[11] Xi Chen,et al. Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[12] Wonjun Lee,et al. ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks , 2005, IEICE Trans. Commun..
[13] Akshai K. Aggarwal,et al. PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks , 2010, Secur. Commun. Networks.
[14] Richard A. Frost,et al. A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.
[15] Hung-Yu Chien,et al. Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[16] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .
[17] Yuguang Fang,et al. AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.
[20] Ali Miri,et al. Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.
[21] Guangsong Li,et al. A New Scheme for Key Management in Ad Hoc Networks , 2005, ICN.
[22] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[24] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.
[25] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[26] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[27] Wonjun Lee,et al. Optimizing Authentication Mechanisms Using ID-Based Cryptography in Ad Hoc Wireless Mobile Networks , 2004, ICOIN.
[28] Ali Miri,et al. An authenticated broadcasting scheme for wireless ad hoc network , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[29] Mingtuo Zhou,et al. Millimeter Wave Technology in Wireless PAN, LAN, and MAN , 2007 .
[30] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[31] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[32] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[33] Wonjun Lee,et al. ISSRP: A Secure Routing Protocol Using Identity-Based Signcryption Scheme in Ad-Hoc Networks , 2004, PDCAT.
[34] Akshai Aggarwal,et al. General-purpose Identity Hiding Schemes for Ad-hoc Networks , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.