1 |
H. Luo, S. Lu, 'Ubiquitous and Robust Authentication Service for Ad Hoc Wireless Network, n Technical Report TR-2000, 30, Dept. of Computer Science, UCLA, 2000
|
2 |
A. Shamir, 'How to Share a Secret' Communication of the ACM, 22(11), pp.612-613, 1979
DOI
ScienceOn
|
3 |
J. Kong, P. Zerfos, H. Luo, S. Lu, L.Zhang, 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Network,' IEEE 9th International conference on Network Protocols(ICNP'01), pp.251-260, 2001
|
4 |
K. Sanzgiri, B. Dahill, B Levine, C Shields, E. Belding-Royer, 'A Secure Routing Protocol for Ad Hoc Network,'Proc. of ICNP02, pp.78-87, 2002
|
5 |
Y. Frankel, Y. G. Demedt, 'Parallel Reliable Threshold Multi-signature', Univ. of Wisconsin-Milwaukee. Technical Report TR-92-94-02. Apr. 1992
|
6 |
T. P Pedersen, 'A Threshold Crypto System without a Trusted Party,' In Advances in Cryptolgy Eurocypt 91, pp. 522-526, 1991
|
7 |
H.Luo, J.Kong, P. Zerfos, S. Lu, L.Zhang, 'Self-securing Ad Hoc Wireless Networks,' 7th IEEE Symposium on Computer and Communications, pp.1627 -1637, 2000
|
8 |
S. Basagni, K. Herrin, E. Rosti, and D. Bruschi, 'Secure Pebble-nets', Proc. of the ACM Symposium on MobiHoc, pp.156-163, 2001
|
9 |
L. Zhou, Z J. Haas, 'Securing Ad Hoc Network', IEEE Network, 13(6), pp.24-30, 1999
|