Opportunistic node authentication in intermittently connected mobile ad hoc networks
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[3] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[4] Zhensheng Zhang,et al. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.
[5] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[8] Ger Koole,et al. The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[11] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[12] S. Keshav,et al. Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[13] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[15] Cauligi S. Raghavendra,et al. Performance analysis of mobility-assisted routing , 2006, MobiHoc '06.
[16] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[18] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[21] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.