Practical distributed secret key generation for delay tolerant networks
暂无分享,去创建一个
[1] Jie Wu,et al. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers , 2011, Comput. Secur..
[2] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[5] Stephen Farrell,et al. Delay-Tolerant Networking Security Overview , 2009 .
[6] S. Keshav,et al. Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[7] Joseph K. Liu,et al. Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.
[8] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[9] Pan Hui,et al. Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.
[10] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[11] Jie Yang,et al. Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[12] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[13] Godwin Ansa,et al. Mitigating Denial of Service Attacks in Delay-and Disruption-Tolerant Networks , 2010, PSATS.
[14] John G. Proakis,et al. Evolution of Seaweb underwater acoustic networking , 2000, OCEANS 2000 MTS/IEEE Conference and Exhibition. Conference Proceedings (Cat. No.00CH37158).
[15] Ian Goldberg,et al. Distributed Private-Key Generators for Identity-Based Cryptography , 2010, SCN.
[16] Dan Boneh,et al. Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.
[17] Pan Hui,et al. Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding , 2005 .
[18] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[19] Gene Tsudik,et al. Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[20] V. Cahill,et al. Security considerations in space and delay tolerant networks , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).
[21] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[22] S. Nedevschi,et al. Hierarchical identity based cryptography for end-to-end security in DTNs , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.
[23] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[24] Xiaodong Lin,et al. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs , 2010, 2010 Proceedings IEEE INFOCOM.
[25] R. Durst,et al. Interplanetary internet (ipn): architectural definition , 2001 .
[26] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[27] Xiaodong Lin,et al. Public key distribution scheme for delay tolerant networks based on two-channel cryptography , 2012, J. Netw. Comput. Appl..
[28] Jörg Ott,et al. Applicability of identity-based cryptography for disruption-tolerant networking , 2007, MobiOpp '07.