TIDS: threshold and identity-based security scheme for wireless ad hoc networks
- 31 July 2004
- journal article
- Published by Elsevier BV in Ad Hoc Networks
- Vol. 2 (3), 291-307
- https://doi.org/10.1016/j.adhoc.2004.03.005
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Stealth attacks on ad-hoc wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Reducing the cost of security in link-state routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- ID-based signatures from pairingson elliptic curvesElectronics Letters, 2002
- An Identity Based Encryption Scheme Based on Quadratic ResiduesLecture Notes in Computer Science, 2001
- Non-Interactive and Information-Theoretic Secure Verifiable Secret SharingPublished by Springer Science and Business Media LLC ,2001
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Signcryption and its applications in efficient public key solutionsPublished by Springer Science and Business Media LLC ,1998
- A modular approach to key safeguardingIEEE Transactions on Information Theory, 1983
- On secret sharing systemsIEEE Transactions on Information Theory, 1983
- How to share a secretCommunications of the ACM, 1979