Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
Efficient Implementation of Pairing-Based Cryptosystems
Journal of Cryptology
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure communications for cluster-based ad hoc networks using node identities
Journal of Network and Computer Applications
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
Security for cluster based ad hoc networks
Computer Communications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
MD5 collisions and the impact on computer forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Authenticated routing for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
Near-term digital radio (NTDR) network is a kind of MANET in which mobile nodes are assigned into different clusters. Therefore, it can let the nodes to communicate with each other efficiently in a large area. Despite several NTDR protocols have been proposed, there still lacks an efficient secure one. Accordingly, in this paper, we propose a new method based on ID-based bilinear pairings to overcome the unsolved security problems nowadays. After our analysis, we conclude that our scheme is the first protocol for NTDR network that is not only secure but also very efficient.