1 |
C. P. Schnorr. 'Efficient Signature Generation by Smart Cards', Journal of Cryptology, Vol. 4, No. 3, pp.161-174, 1991
|
2 |
A. Shamir, 'How to Share a Secret', Communications of the ACM, 22(11), 1979
|
3 |
M. Narasimha, G. Tsudik, and J. H. Yi, 'On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control', IEEE International Conference on Network Protocols (ICNP'03), pp.336-345, 2003
|
4 |
K. Barr and K. Asanovic, 'Energy Aware Lossless Data Compression', International Conference on Mobile Systems, Applications, and Services (MobiSys'03), May 2003
|
5 |
T. P. Pedersen, 'A Threshold Cryptosystem without a Trusted Party', Eurocrypt'91, LNCS No. 547, pp.522-526, 1991
|
6 |
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, 'Adaptive Security for Multi-level Ad-hoc Networks', Journal of Wireless Communications and Mobile Computing, volume 2, pp.533-547, 2002
DOI
ScienceOn
|
7 |
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 'Providing Robust and Ubiquitous Security Support for MANET', IEEE International Conference on Network Protocols (ICNP'01), pp.251-260, 2001
|
8 |
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, 'URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks', IEEE/ACM Transactions on Networking, 12(6), pp.1049-1063, 2004
DOI
ScienceOn
|
9 |
P. Feldman, 'A Practical Scheme for Non-interactive Verifiable Secret Sharing', Symposium on Foundations of Computer Science (FOCS'87), pp.427-437, 1987
|