ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
◽
10.1007/s11704-011-0197-5
◽
2011
◽
Vol 5
(4)
◽
pp. 442-447
◽
Cited By ~ 4
Author(s):
Xixiang Lv
◽
Hui Li
◽
Baocang Wang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Key Distribution
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Pseudo-identity based encryption and its application in mobile ad hoc networks
2011 IEEE 10th Malaysia International Conference on Communications
◽
10.1109/micc.2011.6150298
◽
2011
◽
Cited By ~ 1
Author(s):
Prakash Veeraraghavan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Identity Based Encryption
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-89500-0_29
◽
2018
◽
pp. 325-335
Author(s):
Guangli Xiang
◽
Lu Yu
◽
Beilei Li
◽
Mengsen Xia
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Key Distribution
◽
Self Healing
◽
Distribution Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Security and Privacy in Ad-hoc and Sensor Networks - Lecture Notes in Computer Science
◽
10.1007/978-3-540-73275-4_7
◽
2007
◽
pp. 87-100
◽
Cited By ~ 9
Author(s):
Johann van der Merwe
◽
Dawoud Dawoud
◽
Stephen McDonald
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Key Distribution
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks
IEICE Transactions on Communications
◽
10.1093/ietcom/e88-b.6.2548
◽
2005
◽
Vol E88-B
(6)
◽
pp. 2548-2556
◽
Cited By ~ 18
Author(s):
B.-N. PARK
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocol
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Signcryption Scheme
Download Full-text
Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised
International Journal of Electronic Security and Digital Forensics
◽
10.1504/ijesdf.2014.065738
◽
2014
◽
Vol 6
(4)
◽
pp. 268
Author(s):
A. Jegatheesan
◽
D. Manimegalai
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Key Distribution
◽
Symmetric Key
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06)
◽
10.1109/sutc.2006.1636220
◽
2006
◽
Cited By ~ 1
Author(s):
Hung-Yu Chien
◽
Ru-Yu Lin
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Agreement
◽
Ad Hoc
◽
Bilinear Pairing
◽
Key Agreement Protocol
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
◽
10.1504/ijsn.2007.013177
◽
2007
◽
Vol 2
(3/4)
◽
pp. 239
◽
Cited By ~ 7
Author(s):
Katrin Hoeper
◽
Guang Gong
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Key Escrow
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Improvement of the Naive Group Key Distribution Approach for Mobile Ad Hoc Networks
Lecture Notes in Computer Science - Mobile Ad-hoc and Sensor Networks
◽
10.1007/11599463_74
◽
2005
◽
pp. 763-772
Author(s):
Yujin Lim
◽
Sanghyun Ahn
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Key Distribution
◽
Group Key
◽
Naive Group
◽
Mobile Ad Hoc
◽
Group Key Distribution
◽
Hoc Networks
Download Full-text
Energy efficient CBMT for secure multicast key distribution in mobile ad hoc networks
Procedia Computer Science
◽
10.1016/j.procs.2010.11.032
◽
2010
◽
Vol 2
◽
pp. 248-255
◽
Cited By ~ 1
Author(s):
D. Suganyadevi
◽
G. Padmavathi
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Energy Efficient
◽
Ad Hoc
◽
Key Distribution
◽
Secure Multicast
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Identity-based key management in mobile ad hoc networks: techniques and applications
IEEE Wireless Communications
◽
10.1109/mwc.2008.4653131
◽
2008
◽
Vol 15
(5)
◽
pp. 46-52
◽
Cited By ~ 55
Author(s):
E. da Silva
◽
A. dos Santos
◽
L.C.P. Albini
◽
M. Lima
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Identity Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close