Authenticated Key Exchange (AKE) in Delay Tolerant Networks
暂无分享,去创建一个
[1] Stephen Farrell,et al. Delay-Tolerant Networking Security Overview , 2009 .
[2] H. Elkamchouchi,et al. An efficient and confirmed protocol for authenticated key agreement , 2008, 2008 National Radio Science Conference.
[3] Dimitrios Hristu-Varsakelis,et al. Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols , 2007, ICETE.
[4] H.M. Elkamchouchi,et al. A new secure and fast hashing algorithm (SFHA-256) , 2008, 2008 National Radio Science Conference.
[5] Alfred Menezes,et al. Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.
[6] Xiaodong Lin,et al. Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..
[7] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[8] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[9] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).
[10] H. Cruickshank,et al. Security analysis for Delay/Disruption Tolerant satellite and sensor networks , 2009, 2009 International Workshop on Satellite and Space Communications.
[11] Kristin E. Lauter,et al. Security Analysis of KEA Authenticated Key Exchange Protocol , 2006, IACR Cryptol. ePrint Arch..
[12] Dimitrios Hristu-Varsakelis,et al. A Provably Secure One-Pass Two-Party Key Establishment Protocol , 2007, Inscrypt.
[13] Chi-Chun Lo,et al. Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols , 2010 .
[14] Wesley M. Eddy,et al. A bundle of problems , 2009, 2009 IEEE Aerospace conference.
[15] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[16] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[17] Jörg Ott,et al. NRC-TR-2007-007 Towards Securing Disruption-Tolerant Networking , 2007 .
[18] Alireza Nemaney Pour,et al. Number Theory and related Algorithms in Cryptography , 2002 .
[19] Patrick Horster,et al. Authenticated encryption schemes with low communication costs , 1994 .
[20] Stephen Farrell,et al. Bundle Security Protocol Specification , 2011, RFC.
[21] Konstantinos Chalkias,et al. Attacks on the AKACP Protocol , 2010, IACR Cryptol. ePrint Arch..
[22] H. Elkamchouchi,et al. A New Approach for Key Controlled Agreement , 2007, 2007 National Radio Science Conference.
[23] William L. Van Besien. Dynamic, non-interactive key management for the bundle protocol , 2010, CHANTS '10.
[24] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[25] Stephen Farrell. DTN Key Management Requirements , 2007 .