Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography
- 1 June 2015
- journal article
- research article
- Published by Wiley in ETRI Journal
- Vol. 37 (3), 512-522
- https://doi.org/10.4218/etrij.15.0114.0195
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc NetworksIEEE Communications Surveys & Tutorials, 2011
- Identity-Based Threshold Key Management for Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A survey on peer-to-peer key management for mobile ad hoc networksACM Computing Surveys, 2007
- Securing Mobile Ad Hoc Networks with Certificateless Public KeysIEEE Transactions on Dependable and Secure Computing, 2006
- Bootstrapping security associations for routing in mobile ad-hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A survey of security issues in mobile ad hoc and sensor networksIEEE Communications Surveys & Tutorials, 2005
- TIDS: threshold and identity-based security scheme for wireless ad hoc networksAd Hoc Networks, 2004
- Threshold and identity-based key management and authentication for wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Toward secure key distribution in truly ad-hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000