Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Lecture Notes in Computer Science;D. Boneh,2001
2. Lecture Notes in Computer Science;C. Boyd,2004
3. Crépeau, C., Davis, C.R.: A Certificate Revocation Scheme for Wireless Ad Hoc Networks. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), pp. 54–61. ACM Press, New York (2003)
4. Deng, H., Mukherjee, A., Agrawal, D.P.: Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks. In: International Conference on Information Technology: Coding and Computing (ITCC 2004), vol. 1, pp. 107–115 (2004)
5. Hoeper, K., Gong, G.: Short paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks. In: Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005) (2005)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献