ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Security Considerations in Space and Delay Tolerant Networks
SMC-IT '06 Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology
Efficient routing in intermittently connected mobile networks: the multiple-copy case
IEEE/ACM Transactions on Networking (TON)
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A ring signature scheme using bilinear pairings
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Security in vehicular ad hoc networks
IEEE Communications Magazine
The challenges of building mobile underwater wireless networks for aquatic applications
IEEE Network: The Magazine of Global Internetworking
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
Efficient and multi-level privacy-preserving communication protocol for VANET
Computers and Electrical Engineering
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
Hi-index | 0.00 |
Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.