Collaborative backup for dependable mobile applications
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EURASIP Journal on Wireless Communications and Networking
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On Dynamic Distribution of Private Keys over MANETs
Electronic Notes in Theoretical Computer Science (ENTCS)
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Dynamic trust establishment in emergency ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key management scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An efficient identity-based group key agreement protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Multi-key hierarchical identity-based signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
A key management scheme combined with intrusion detection for mobile ad hoc networks
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
KALwEN+: practical key management schemes for gossip-based wireless medical sensor networks
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
Key revocation for identity-based schemes in mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Improving the ID-Based key exchange protocol in wireless mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
UGSP: secure key establishment protocol for ad-hoc networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A composite key management scheme for mobile ad hoc networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Evaluating identity management architectures
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
Security and Communication Networks
Content-location based key management scheme for content centric networks
Proceedings of the 6th International Conference on Security of Information and Networks
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Broadcast encryption based non-interactive key distribution in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
Ad-hoc network - and in particular wireless mobilead-hoc network - have unique characteristic and constraint that make traditional cryptographic mechanismsand assumptions inappropriate. In particular, it may notbe warranted to assume pre-existing shared secrets betweenmember of the network or the presence of a common PKI.Thus, the issue of key distribution in ad-hoc networks represent an important problem. Unfortunately, this issue hasbeen largely ignored; as an example, most protocols forsecure ad-hoc routing assume that key distribution has already taken place.Traditional key distribution schemes either do not applyin an ad-hoc scenario or are not efficient enough for mall,resource-constrained devices. We propose to combine efficient technique from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc network. We also discuss the availablemechanisms and their suitability for the proposed task.