PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2005.
DOI: 10.1109/pacrim.2005.1517324
|View full text |Cite
|
Sign up to set email alerts
|

On demand distributed public key management for wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 1 publication
0
17
0
Order By: Relevance
“…Though they analyzed their method 8) , it was based on a communication cost that did not consider the size of a packet. We first divide the method into two phases and analyze each of the two phases by using our definition of communication cost to compare the method and the proposed method.…”
Section: Analysis Of the Kitada Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Though they analyzed their method 8) , it was based on a communication cost that did not consider the size of a packet. We first divide the method into two phases and analyze each of the two phases by using our definition of communication cost to compare the method and the proposed method.…”
Section: Analysis Of the Kitada Methodsmentioning
confidence: 99%
“…The communication complexity of standard algorithms for constructing a spanning tree is O(|E|), where |E| is the number of elements of E 11) . Kitada, et al showed that the Kitada method can find a certificate-chain in a usual ad-hoc network with topology change by computer simulation 8) . This is because there are some certificate-chain from a given source node to a given destination node.…”
Section: Certificate Searching Phasementioning
confidence: 99%
See 2 more Smart Citations
“…However, this scheme suffers from the delay and the large amount of traffic required to collect certificates. Kitada et al in [10], and [11] considered the problem of certificate chain discovery by introducing the Ad hoc Simultaneous Nodes Search protocol (ASNS) to find a certificate chain. In the proposed scheme by Kitada et al, each node holds in its local repository only certificates issued to it in order to reduce the memory size and collects certificates by broadcasting search packets to chained nodes.…”
Section: Related Workmentioning
confidence: 99%