Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells
暂无分享,去创建一个
Marcus de Ree | Ifiok E. Otung | Georgios Mantas | Jonathan Rodriguez | Jonathan Rodriguez | I. Otung | G. Mantas | M. D. Ree
[1] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[2] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[3] Junzuo Lai,et al. Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.
[4] Byoung heon Lee. Self-Certificate: PKI using Self-Certified Key , 2000 .
[5] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[6] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.
[9] Ya-Ju Yu,et al. Mobile small cell deployment for next generation cellular networks , 2014, 2014 IEEE Global Communications Conference.
[10] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[11] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[12] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[13] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[14] Joonsang Baek,et al. Certificateless Public Key Encryption Without Pairing , 2005, ISC.
[15] Ekram Hossain,et al. 5G cellular: key enabling technologies and research challenges , 2015, IEEE Instrumentation & Measurement Magazine.
[16] Kefei Chen,et al. Self-generated-certificate public key encryption without pairing and its application , 2011, Inf. Sci..
[17] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[18] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[19] Stanisław Jarecki,et al. Proactive secret sharing and public key cryptosystems , 1995 .
[20] Georgios Mantas,et al. Key Management for Beyond 5G Mobile Small Cells: A Survey , 2019, IEEE Access.
[21] Georgios Mantas,et al. Key Management for Secure Network Coding-Enabled Mobile Small Cells , 2018, BROADNETS.
[22] Jonathan Rodriguez,et al. SECRET — Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking for 5G , 2017, 2017 Internet Technologies and Applications (ITA).
[23] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.