1 |
Z. Zhu, Y. Zhang and F. Wang, "An efficient and provable secure identity based ring signcryption scheme," Computer Standards & Interfaces 31, pp. 1092-1097, 2009.
DOI
ScienceOn
|
2 |
H. Y. Chien, "ID-based key agreement with anonymity for ad hoc networks," EUC 2007, LNCS 4808, pp. 333-345, Springer- Verlag, 2007.
|
3 |
I. G. Han, K. W. Rim, and J. H. Lee, "The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network," Journal of the Korea Industrial Information System Society, vol. 14, no. 2, pp. 1-22, June, 2006.
|
4 |
Y. H. Park, "Vehicle registration protocol for secure communication in VANET environment," Journal of the Korea Industrial Information System Society, vol. 15, no. 4, pp. 1-5, Dec. 2010.
|
5 |
E. D. Silva, A. L. D. Santos, and L. C. P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE Wireless Communications, vol. 15, pp. 46-52, Oct. 2008.
|
6 |
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Transactions on Dependable and Secure Computing, vol. 3, pp. 386-399, 2006.
DOI
|
7 |
A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPT084, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
|
8 |
D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing," CRYPTO01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
|
9 |
L. C. Li, and R. S. Liu, "Securing cluster-based ad Hoc networks with distributed authorities," IEEE Transactions on Wireless Communications, vol. 9, pp. 3072-3081, 2010.
DOI
|
10 |
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," CRYPTO 02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002.
|