1 |
L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," 16th IEEE Security Foundations Workshop, pp.219-233, 2002.
|
2 |
Laurent Eschenauer and Virgil D.Gligor, "A key-Management Scheme for Distributed Sensor Networks," Conference on Computer and Communications Security, pp. 41-47, 2002.
|
3 |
Michael Steiner, Gene Tsudik, and Michael Waidner, "Diffie-Hellman key Distribution Extended to Group communication," Conference on Computer and Communications Security, pp.31-37, 1996.
|
4 |
Vijay Varadharajan, Rajan Shankaran, and Michael Hitchens, "Security for cluster based ad hoc networks," J. of Computer Communications, Vol.27, No.5, pp.488-501, 2005.
|
5 |
M. Bohio and A. Miri, "Efficient identity-based security schemes for a hoc network routing protocols," J. of Ad hoc networks, Vol.2, No.3, pp.309-317, 2004.
DOI
ScienceOn
|
6 |
Hung Yu chien and Ru-Yu Lin, "Improved ill-based security framework for ad hoc network," J. of Ad hoc networks, Vol.6, No.1, pp. 47-60, 2008.
DOI
ScienceOn
|
7 |
Jung-San Lee and Chin-Chen Chang, "Secure communications for cluster-based ad hoc networks using node identities," J. of Network and computer Applications, Vol.30, No.4, pp. 1377-1396, 2007.
DOI
ScienceOn
|
8 |
G.V.S. Raju and Rehan Akbani, "Mobile Ad Hoc Networks Security," International Engineering Consortium, Annual Review of Communications, Vol. 58, pp. 625-628, 2006.
|
9 |
Wang changda and Ju shiguang, "Multilevel security model for ad hoc networks," J. of Systems Engineering and Electronics, Vol.19, No.2, pp. 391-397, 2008.
DOI
ScienceOn
|
10 |
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," Advances in Cryptology-CRYPTO 2001, LNCS 2139, pp. 213-229, 2001.
|