Citation: | Chen Wei, Long Xiang, Gao Xiaopenget al. Identity-based authentication scheme for mobile ad hoc networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 869-872. (in Chinese) |
[1] IETF MANET work group. http://www.ietf.org/html.charters/manet-charter.html [2] Khalili A, Katz J, Arbaugh W,et al. Toward secure key distribution in truly ad hoc networks Proceedings of the 2003 Symposium on Application and the Internet Workshops. :IEEE Computer Society, 2003:1-5 [3] Deng Hongmei, Mukherjee A, Agrawal D P. Threshold and identity-based key management and authentication for wireless ad hoc networks Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC 2004). :IEEE Computer Society, 2004:107-111 [4] Dolev D, Yao A C. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2):198-208 [5] Shamir S. How to share a secret[J]. Communications of the ACM, 1979, 22(11), 612-613 [6] Cha J ,Cheon J H. An identity-based signature from gap diffie-hellman groups Proc of the PKC 2003. :Springer-Verlag, 2003, 18(30):18-30 [7] Shamir A. Identity-based cryptosystems and signature schemes Proceedings of Crypto′84, Lecture Notes in Computer Science. :Springer-Verlag, 1984:47-53 [8] Boneh D, Franklin M. Identity based encryption from the Weil pairing Extended Abstract in Proceedings of Crypto ′2001, Lecture Notes in Computer Science. :Springer-Verlag, 2001:213-229 [9] Stallings W. Cryptography and network security:principles and practice [M]. 3rd ed. Upper Saddle River N J :Prentice Hall, 2003 [10] Mao Wenbo. Modern cryptography:theory and practice [M]. Upper Saddle River, NJ :Prentice Hall PTR, 2004 [11] Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). IETF RFC3174, 2001.http://www.ietf.ore/rfc/rfc3174.txt?number=3174
|