Providing a collaborative mechanism for peer group access control
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[2] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[3] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[4] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[5] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[8] Byrav Ramamurthy,et al. Secure Group Communications Over Data Networks , 2004 .
[9] Partha Dasgupta,et al. Distributed authentication for peer-to-peer networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[10] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[11] Gesine Reinert,et al. Small worlds , 2001, Random Struct. Algorithms.
[12] Perry B. Gentry. What is a VPN? , 2001, Inf. Secur. Tech. Rep..
[13] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[14] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[15] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[16] Tom Groth,et al. Project JXTA , 2002, Peer-to-Peer: Ökonomische, technische und juristische Perspektiven.
[17] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[18] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[19] Patrick Th. Eugster,et al. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[20] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[21] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[22] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[23] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .