Authentication protocol using an identifier in an ad hoc network environment
暂无分享,去创建一个
[1] Ali Miri,et al. Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.
[2] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[5] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[6] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[7] Liqun Chen,et al. Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[8] Hung-Yu Chien,et al. Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.
[9] Wang Changda,et al. Multilevel security model for ad hoc networks , 2008 .
[10] Turgay Korkmaz,et al. Mobile Ad-Hoc Networks Security , 2012, CSIE 2012.