Citation: | Chen Wei, Long Xiang, Gao Xiaopenget al. Identity-based authentication scheme for mobile ad hoc networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 869-872. (in Chinese) |
[1] IETF MANET work group. [2] Khalili A, Katz J, Arbaugh W,et al. Toward secure key distribution in truly ad hoc networks Proceedings of the 2003 Symposium on Application and the Internet Workshops. :IEEE Computer Society, 2003:1-5[3] Deng Hongmei, Mukherjee A, Agrawal D P. Threshold and identity-based key management and authentication for wireless ad hoc networks Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC 2004). :IEEE Computer Society, 2004:107-111[4] Dolev D, Yao A C. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2):198-208[5] Shamir S. How to share a secret[J]. Communications of the ACM, 1979, 22(11), 612-613[6] Cha J ,Cheon J H. An identity-based signature from gap diffie-hellman groups Proc of the PKC 2003. :Springer-Verlag, 2003, 18(30):18-30[7] Shamir A. Identity-based cryptosystems and signature schemes Proceedings of Crypto′84, Lecture Notes in Computer Science. :Springer-Verlag, 1984:47-53[8] Boneh D, Franklin M. Identity based encryption from the Weil pairing Extended Abstract in Proceedings of Crypto ′2001, Lecture Notes in Computer Science. :Springer-Verlag, 2001:213-229[9] Stallings W. Cryptography and network security:principles and practice [M]. 3rd ed. Upper Saddle River N J :Prentice Hall, 2003[10] Mao Wenbo. Modern cryptography:theory and practice [M]. Upper Saddle River, NJ :Prentice Hall PTR, 2004[11] Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). IETF RFC3174, 2001.
|