Multi-level and group-based key management for mobile ad hoc networks
暂无分享,去创建一个
Hui-Tang Lin | Wen-Chung Kuo | Ming-Kung Sun | Hsiao-ching Lin | W. Kuo | Ming-Kung Sun | Hui-Tang Lin | Hsiao-Ching Lin
[1] Dimitrios D. Vergados,et al. An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing , 2007, Wirel. Pers. Commun..
[2] Dharma P. Agrawal,et al. Level-based key establishment for multicast communication in mobile ad hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[3] Chen Li-qing,et al. Group Key Agreement Scheme for Mobile Ad Hoc Networks Based on Threshold Secret Sharing , 2010, 2010 Third International Symposium on Electronic Commerce and Security.
[4] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[5] Seema Ansari,et al. Certificateless ID-based authentication using threshold signature for P2P MANETs , 2009, 2009 International Conference on Information and Communication Technologies.
[6] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Lein Harn,et al. Strong (n, t, n) verifiable secret sharing scheme , 2010, Inf. Sci..
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[11] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..