2007
DOI: 10.1504/ijsn.2007.013177
|View full text |Cite
|
Sign up to set email alerts
|

Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…A shared session can be obtained as K ses = h(r A T B ) = h(r B T A ) which is unknown to the TTP and achieves perfect forward secrecy. A revised version of this protocol can be found in their later work [Gong 2007].…”
Section: · Shushan Zhaomentioning
confidence: 99%
See 2 more Smart Citations
“…A shared session can be obtained as K ses = h(r A T B ) = h(r B T A ) which is unknown to the TTP and achieves perfect forward secrecy. A revised version of this protocol can be found in their later work [Gong 2007].…”
Section: · Shushan Zhaomentioning
confidence: 99%
“…Although it may be a desirable feature in some cases (e.g. in military hierarchy), Hoeper and Gong in [Hoeper and Gong 2005b] and [Hoeper and Gong 2007] identify it as a problem with ad hoc networks. The authors refer to proposed solutions: using additional private/public key pairs [Gentry 2003]; · Shushan Zhao assigning an expiry date to the system's master secret key, or using threshold cryptography to distribute the secret key to multiple nodes [Boneh and Franklin 2001;Boyd et al 2004;Chen and Kudla 2003;Oh et al 2005;Paterson 2002].…”
Section: · 21mentioning
confidence: 99%
See 1 more Smart Citation
“…There are many related research studies in the following topics: various attacks and vulnerabilities , key management , traceback , elliptic curve cryptosystem intrusion detection , radio frequency identification security , security in wireless networks , trust , authentication , security in peer‐to‐peer networks , and other security issues .…”
Section: Introductionmentioning
confidence: 99%
“…There are many related research studies in the following topics: various attacks and vulnerabilities [5 -20], key management [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36], traceback [37][38][39][40], elliptic curve cryptosystem [41][42] intrusion detection [44 -50], radio frequency identification security [51][52][53][54][55][56][57], security in wireless networks [58][59][60][61][62][63][64][65][66][67][68][69][70][71][72][73][74][75], authentication [76 -85], security in peer-topeer networks …”
Section: Introductionmentioning
confidence: 99%