1 |
P. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," Communications surveys & Tutorials, IEEE volume 7, pp. 2-21, 2005.
|
2 |
K. Namhi, P. Ilkyun, and K. Younghan, "Ubiquitous zone networking technologies for multi-hop based wireless communications," IWSOS 2006, LNCS 4124, September 2006.
|
3 |
C. Jaeduck, R. Hyosun, J. Souhwan, and K. Younghan, "Support of Context-awareness in Ubiquitous Networks using Smart Packet," IPSJ SIG 2005, pp. 275-280, 2005.
|
4 |
C. Siva Ram Murthy and B. S, Manoj, "Ad Hoc Wireless Networks Architectures and Protocols," Prentice Hall PTR, 2004.
|
5 |
C. P. Schnorr, "Efficient Identification and Signatures for Smart cards," Advances of Cryptology- CRYPTO '89, LNCS, pp. 239-251, January, 1989.
|
6 |
K. Nyberg and R. A. Rueppel, "Message recovery for signature scheme based on the discrete logarithm problem," Eurocrypt '94 proceedings, 1995.
|
7 |
T. ElGamal, "A Public Key Cryptosystem and a signature scheme based on discrete logarithms," Advances of Cryptology-CRYPTO '84, LNCS 196, pp. 10-18, 1985.
|
8 |
F Zhang, R Safavi-Naini and CY Lin, "New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings," Advances in Cryptology-Asiacrypt 2002, LNCS 2510, 2002.
|
9 |
D. Simon, B. Aboba and R. Hurst, "The EAP-TLS Authentication Protocol," IETF RFC 5216, March 2008.
|
10 |
W. Diffie and M. E. Hellman, "Multi cryptographic techniques," AFIPS Conference Proceedings, pp. 109-112, 1976.
|
11 |
S. Corson and J. Macker, "Mobile ad-hoc networking (MANET)," IETF RFC 2051, January 1999.
|
12 |
FIPS PUB XX, "Digital Signature Standard (DSS)," February, 1993.
|
13 |
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: Delegation pf the power to sign message," IEICE Teans, E79-A, pp. 1338-1354, 1996.
|
14 |
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Commun. ACM, pp. 120-126, 1978.
|