An ID-based node key management scheme based on PTPM in MANETs
暂无分享,去创建一个
Guang Yang | Lei Han | Jiqiang Liu | Jiqiang Liu | Guang Yang | Lei Han
[1] Xuefeng Zheng,et al. An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[2] Paz Morillo,et al. Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.
[3] Yang Xin,et al. Efficient ID-based TPM key loading scheme for trusted platform , 2010 .
[4] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[5] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[6] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[7] U. Maurer,et al. A non-interactive public-key distribution system , 1996 .
[8] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[9] Manju Khari,et al. A Review on Key Management Schemes in MANET , 2012 .
[10] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.
[11] Jianping Pan,et al. Identity-based secure collaboration in wireless ad hoc networks , 2007, Comput. Networks.
[12] Toshiya Itoh,et al. An ID-based cryptosystem based on the discrete logarithm problem , 1989, IEEE J. Sel. Areas Commun..
[13] Jiqiang Liu,et al. A Portable TPM Scheme for General-Purpose Trusted Computing Based on EFI , 2009 .
[14] Chu-Hsing Lin,et al. Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[15] Mahalingam Ramkumar,et al. An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.
[16] Zhen Han,et al. A portable TPM based on USB key , 2010, CCS '10.
[17] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[18] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[19] Michele Nogueira Lima,et al. Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.
[20] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.
[21] Hisham Dahshan,et al. A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem , 2010, 2010 8th Annual Communication Networks and Services Research Conference.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Kaoru Kurosawa,et al. k-Resilient Identity-Based Encryption in the Standard Model , 2004, CT-RSA.
[24] Otto Carlos Muniz Bandeira Duarte,et al. A lightweight group-key management protocol for secure ad-hoc-network routing , 2011, Comput. Networks.
[25] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[26] Lei Han,et al. Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[27] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[28] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[29] Hatsukazu Tanaka. A Realization Scheme for the Identity-Based Cryptosystem , 1987, CRYPTO.
[30] Kaoru Kurosawa,et al. k-Resilient Identity-Based Encryption in the Standard Model , 2004, CT-RSA.