Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
CNSR '04 Proceedings of the Second Annual Conference on Communication Networks and Services Research
Hi-index | 0.00 |
In 2005, Liaw et al. proposed an ID-based key exchange protocol without the auxiliary of certification authority that can be applied to wireless mobile Ad hoc networks, which can solve the security problem in the Wireless Mobile Ad hoc Networks (MANET) and is suitable for other wired network structures. Liaw et al.'s protocol, however, still has other serious weaknesses. The current paper will demonstrate the vulnerability of the protocol. Furthermore, we present a method that can avoid attacks.