1 |
Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wemg, "Talking To Stranger: Authenticatiem in Ad-Hoc WIreless Networks", In Proceedings of the Network and Distributed System Security Symposium 2002, 2002
|
2 |
T. El Gamal, "A public key cryptooystem and a signature scheme based on discrete logarithms", IEEE Trans. Inform. Theory, 31:469-472, 1985
DOI
|
3 |
Y. Desmedt. "Society and group oriented cryptography: a new concept", In C. Pomerance, editor, Advances in cryptology, Proc. of Crypto'87(Lecture Notes in computer Science 293), pages 120-127. Springer-Verlag, 1988. Santa Barbara, california, U.S.A., August 16-20
|
4 |
Y. Desmedt and Y. Frankel, "Threshold cryptosystems", in Advances in Cryptology - Crypto '89, Proceedings, Lecture Notes in Computer Science 435, G. Brassard, Ed., Santa Barbara: Springer-Verlag, 1990, pp. 307-315
|
5 |
W. Diffie and M E. Helhnan, "New directions in cryptography", IEEE Trans. Inform Theory, IT-22(6); 644-654, November 1976
|
6 |
Wenliang Du, Ronghua Wang, and Peng Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks", 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc),2005
|
7 |
Srdjan CapkLm, Levente Buttyan and Jean-Pierre Hubaux, "Small Worlds in Security Systems; an Analysis of the pop Certificate Graph", In Proceedings of the ACM New Security Paradigms Workshop 2002, pp.2, 2002
|
8 |
A Shamir, "How to share a secret", Commun. ACM, 22:612-613, November 1979
DOI
ScienceOn
|
9 |
G. Gaubatz, J. Kaps, and B. Sunar, "Public keys cryptography in sensor networks - revisited", In The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), 2004
|