An efficient identity-based secret key management scheme for MANETs

被引:0
|
作者
Zhang, Yong [1 ]
Qian, Hai-Feng [1 ]
机构
[1] Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China
关键词
Mobile ad hoc networks;
D O I
10.1016/S1005-8885(11)60456-1
中图分类号
学科分类号
摘要
引用
收藏
页码:127 / 136
相关论文
共 50 条
  • [1] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +
  • [2] An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter
    Qin, Zhongyuan
    Zhang, Xinshuai
    Feng, Kerong
    Zhang, Qunfang
    Huang, Jie
    SENSORS, 2014, 14 (10) : 17937 - 17951
  • [3] Towards a fully self-organized identity-based key management system for MANETs
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 717 - 723
  • [4] Efficient identity-based public-key quantum signature scheme
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 34 (10):
  • [5] Key refreshing in identity-based cryptography and its applications in MANETs
    Balfe, Shane
    Boklan, Kent D.
    Klagsbrun, Zev
    Paterson, Kenneth G.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2924 - +
  • [6] Efficient identity-based key encapsulation scheme with wildcards for email systems
    Yang, Yang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (01) : 171 - 183
  • [7] Identity-Based Key Management Scheme for Smart Grid over Lattice
    Yu, Wangke
    Wang, Shuhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96
  • [8] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [9] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [10] Efficient and dynamic key management for multiple identities in identity-based systems
    Guo, Hua
    Xu, Chang
    Li, Zhoujun
    Yao, Yanqing
    Mu, Yi
    INFORMATION SCIENCES, 2013, 221 : 579 - 590