Authentication and key exchange in mobile ad hoc networks

K Hoeper - 2007 - uwspace.uwaterloo.ca
Over the past decade or so, there has been rapid growth in wireless and mobile applications
technologies. More recently, an increasing emphasis has been on the potential of …

Identity-based key issuing protocol for ad hoc networks

Y Ren, J Wang, Y Zhang, L Fang - … International Conference on …, 2007 - ieeexplore.ieee.org
Secure key issuing is an important issue in identity-based cryptography. At present there are
some key issuing protocols in ID-based cryptography, but existent protocols are not applied …

基于身份的Ad Hoc 网络门限密钥发送协议

任勇军, 王建东, 庄毅, 方黎明 - 武汉大学学报: 工学版, 2007 - cqvip.com
目前已提出的多个基于身份的密钥发送协议, 由于AdHoc 网络的特性现有协议都不适用.
针对这一问题, 提出了一个基于身份的AdHoc 网络门限密钥发送协议, 采用门限秘密共享技术 …

Dynamic key management schemes for secure group communication based on hierarchical clustering in mobile adhocnetworks

WJ Tsaur, HT Pai - International Symposium on Parallel and Distributed …, 2007 - Springer
In Mobile ad hoc networks (MANETs), most of current research works in key management
can efficiently handle only limited number of nodes. When the number of nodes is gradually …

动态的Ad Hoc 网络密钥管理方案

任勇军, 王建东, 庄毅, 方黎明 - 南京航空航天大学学报, 2007 - cqvip.com
基于双线性对密码体制, 提出了一个动态密钥管理方案(DKMs), 使用秘密重分配技术,
能够根据网络状况动态调整分享密钥的节点以及门限值的大小, 利用可验证秘密共享技术对不 …

A new security scheme for on-demand source routing in mobile ad hoc networks

WJ Tsaur, HT Pai - Proceedings of the 2007 international conference on …, 2007 - dl.acm.org
Mobile ad hoc networks (MANETs) are a collection of wireless mobile nodes dynamically
forming a local area network or other temporary network without using any existing network …

基于双线性对的Ad hoc 网络主动秘密共享方案

任勇军, 王建东, 庄毅 - 系统工程与电子技术, 2007 - cqvip.com
针对现有的基于双线性对的安全机制都假设在整个Adhoc 网络生存期内系统都是安全的,
而基于该假设的Adhoc 网络并不安全的问题. 重新定义了Adhoc 网络的攻击者模型 …

Practical and robust self-keying scheme for personal area networks

J Cho - 2007 2nd International Conference on Digital …, 2007 - ieeexplore.ieee.org
Providing key pre-distribution in personal area networks (PANs) remains a challenging
problem, in particular because of the unique characteristics of, and constraints on, such …

Chứng thực lẫn nhau trong mạng Ad hoc-Mô hình ngưỡng sử dụng các nút ngẫu nhiên

TN Bao - Journal of Technical Education Science, 2007 - jte.edu.vn
In recent years, mobile ad hoc wireless networks are gaining popularity due to their mobility,
flexibility and ease of deployment everywhere. A mobile ad hoc wireless network is an …

A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks

WJ Tsaur, HT Pai - International Symposium on Parallel and Distributed …, 2007 - Springer
In mobile ad hoc networks (MANETs), since all of the nodes communicate each other based
on the routing protocol, and an attacker could manipulate a lower-level protocol to interrupt a …