A distributed secret share update scheme with public verifiability for ad hoc network
暂无分享,去创建一个
[1] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Akshai Aggarwal,et al. A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.
[4] P. Suresh Varma,et al. Security Challenges and Attacks in Mobile Ad Hoc Networks , 2013 .
[5] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[6] Yangmin Li,et al. A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network , 2012, 2012 IEEE International Conference on Automation and Logistics.
[7] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[8] Siu-Ming Yiu,et al. Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..
[9] Jiafu Wan,et al. Issues and Challenges of Wireless Sensor Networks Localization in Emerging Applications , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[10] Lung-Chung Li,et al. Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.
[11] Jin-Hee Cho,et al. Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.
[12] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Siu-Ming Yiu,et al. An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[16] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[17] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[18] I. A. Choudhry,et al. Secure Key Management and Verification of Mobile Ad Hoc Networks , 2013 .
[19] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.