Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments
暂无分享,去创建一个
Norio Shiratori | Gen Kitagata | Atsushi Takeda | Debasish Chakraborty | Kazuo Hashimoto | Seiya Nakayama | K. Hashimoto | N. Shiratori | G. Kitagata | Atsushi Takeda | D. Chakraborty | S. Nakayama
[1] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Tetsuo Kinoshita,et al. An Agent-Based Healthcare Support System in Ubiquitous Computing Environments , 2009, ICOST.
[4] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[5] M. Clement,et al. Improving Routing Security Using a Decentralized Public Key Distribution Algorithm , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[6] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[7] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[8] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[9] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[10] James Aspnes,et al. Skip graphs , 2003, SODA '03.
[11] I. Sasase,et al. On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..