A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] ChuanFu Zhang,et al. A novel self-certified security access authentication protocol in the space network , 2012, 2012 IEEE 14th International Conference on Communication Technology.
[2] Loren M. Kohnfelder,et al. Towards a practical public-key cryptosystem. , 1978 .
[3] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[4] Marko Hölbl,et al. An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..
[5] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[6] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[7] Atul Negi,et al. An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2011, J. Comput..
[8] Xuemin Shen,et al. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.
[9] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[10] Jian Ma,et al. Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings , 2014, Int. J. Distributed Sens. Networks.
[11] Erich Wenger,et al. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography , 2013, ACNS.
[12] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[13] Renu Taneja,et al. A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks , 2014, Int. J. Space Based Situated Comput..
[14] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[15] Mukesh Singhal,et al. A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC , 2006, J. Parallel Distributed Comput..
[16] Tet Hin Yeap,et al. A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[17] Ali Norouzi,et al. Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare , 2014, Comput. J..
[18] Han-Yu Lin,et al. Self-certified multi-proxy signature schemes with message recovery , 2009 .
[19] Qiaoyan Wen,et al. An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks , 2013, Int. J. Netw. Manag..
[20] Zhu Xingliang,et al. A new authentication scheme for Wireless Ad Hoc Network , 2012, 2012 International Conference on Information Management, Innovation Management and Industrial Engineering.
[21] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[22] Wajdi Alhakami,et al. A secure MAC protocol for Cognitive Radio Networks (SMCRN) , 2013, 2013 Science and Information Conference.