과제정보
연구 과제 주관 기관 : Korea Research Foundation
참고문헌
- E. D. Silva, A. L. D. Santos, and L. C. P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE Wireless Communications, vol. 15, pp. 46-52, Oct. 2008.
- Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Transactions on Dependable and Secure Computing, vol. 3, pp. 386-399, 2006. https://doi.org/10.1109/TDSC.2006.58
- A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPT084, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
- D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," CRYPTO01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
- L. C. Li, and R. S. Liu, "Securing cluster-based ad Hoc networks with distributed authorities," IEEE Transactions on Wireless Communications, vol. 9, pp. 3072-3081, 2010. https://doi.org/10.1109/TWC.2010.080610.090759
- P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," CRYPTO 02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002.
- Z. Zhu, Y. Zhang and F. Wang, "An efficient and provable secure identity based ring signcryption scheme," Computer Standards & Interfaces 31, pp. 1092-1097, 2009. https://doi.org/10.1016/j.csi.2008.09.023
- H. Y. Chien, "ID-based key agreement with anonymity for ad hoc networks," EUC 2007, LNCS 4808, pp. 333-345, Springer- Verlag, 2007.
- I. G. Han, K. W. Rim, and J. H. Lee, "The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network," Journal of the Korea Industrial Information System Society, vol. 14, no. 2, pp. 1-22, June, 2006.
- Y. H. Park, "Vehicle registration protocol for secure communication in VANET environment," Journal of the Korea Industrial Information System Society, vol. 15, no. 4, pp. 1-5, Dec. 2010.