A certificate revocation scheme for wireless ad hoc networks
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] J. Jubin,et al. The DARPA packet radio network protocols , 1987, Proceedings of the IEEE.
[3] Stefaan Seys. Security Architecture for Wireless Ad hoc Networks , 2004 .
[4] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[5] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[6] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[7] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[8] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[9] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[10] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[11] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.
[12] N. Shacham,et al. Future directions in packet radio architectures and protocols , 1987, Proceedings of the IEEE.
[13] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[14] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[15] F.A. Tobagi,et al. Modeling and performance analysis of multihop packet radio networks , 1987, Proceedings of the IEEE.
[16] F.A. Tobagi,et al. Issues in packet radio network design , 1987, Proceedings of the IEEE.
[17] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[18] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[19] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[20] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[21] W.C. Fifer,et al. The low-cost packet radio , 1987, Proceedings of the IEEE.
[22] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[23] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[24] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[25] Silvio Micali,et al. An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .
[26] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[27] B.H. Davies,et al. The application of packet switching techniques to combat net radio , 1987, Proceedings of the IEEE.
[28] J.H. Fischer,et al. Wide-band packet radio technology , 1987, Proceedings of the IEEE.
[29] Carlton R. Davis. Ipsec: Securing Vpns , 2001 .
[30] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[31] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .