期刊文献+

一种面向MANET网络应用的身份认证协议 被引量:1

An entity authentication protocol for MANET
原文传递
导出
摘要 MANET网络的无中心、高度移动性和有限的节点资源等特点给安全目标带来了巨大的挑战。本文根据MANET网络的需求特点设计了一种分布式身份认证协议。该协议无需中心节点或基础设施的支持,每个节点不需要保存其他节点认证口令及秘密,并具有非交互式、抗重放攻击、验证容易的优点。该工作对于建立安全、实用的MANET网络有基础性意义。
出处 《信息安全与通信保密》 2005年第7期144-147,共4页 Information Security and Communications Privacy
基金 本课题得到自然科学基金项目91204005和90412011的支持现代通信国家重点实验室基金项目资助(基金号:51436040203DZ01)
  • 相关文献

参考文献1

二级参考文献10

  • 1Chaum D, Van Heyst E. Group signtures. In: Advances in Cryptology-EUROCRYPT'91. LNCS 547, Berlin: Springer-Verlag, 1991. 257-265.
  • 2Chen L, Pedersen TP. On the efficiency of group signatures providing information-theoretic anonymity. In: DeSantis A, ed. Advances in Cryptology-EUROCRYPT'94. LNCS 950, Berlin: Springer-Verlag, 1995. 171-181.
  • 3Camenisch J. Efficient and generalized grorp signtures. In: Walter F, ed. Advances in Cryptology-EUROCRYPT'9?. LNCS 1233, Berlin: Springer-Verlag, 1997.465-479.
  • 4Petersen H. How to convert any digital signature scheme into a group signature scheme. In: Lomas M, Vaudenay M, eds. Proceedings of the Security Protocols Workshop'97. LNCS 1361, Berlin: Springer-Veflag, 1997.67-78.
  • 5Camenisch J, Stadler M. Efficient group signatures schemes for large groups. In: Kaliski BS, ed. Advances in Cryptology-CRYPT'97. LNCS 1294, Berlin: Springer-Verlag, 1997. 410-423.
  • 6Ateniese G, Tsudik G. Some open issues and new directions in group signatures. In: Franklin M, ed. Financial Cryptography Conference. LNCS 1648, 1999. 196-211.
  • 7Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash. In: Hitschfeld R, ed. Financial Cryptography Conference. LNCS 1465, Berlin: Springer-Verlag, 1998. 184-197.
  • 8Camenisch J, Michels M. Separability and efficiency for generic group signature schemes. In: Wiener M, ed. Advances in Cryptology-EUROCRYPT'99. LNCS 1666, Berlin: Springer-Verlag, 1999.411-430.
  • 9Bresson E, Stern L Efficient revocation in group signature. In: Kim K, ed. PKC 2001. LNCS 1992, Berlin: Springer-Verlag, 1999. 190-206.
  • 10Kim HJ, Lim JI, Lee DH. Efficient and secure member deletion in group signature schemes. In: Dorgho won, ed. Information Security Cryptology 2000. LNCS 2015, Berlin: Springer-Verlag, 2000. 150-161.

共引文献17

同被引文献8

  • 1Belding-Royer E M.Hierarchical muting in ad hoe mobile networks[J].Wireless Commun.and Mobile Comp.,2002,2(5):515-32
  • 2Perkins C E.Ad hoe networking[M].Addison-Wesley,2001
  • 3Jane Y Yu,Peter H J Chong.A survey of clustering schemes for mobile ad hoe networks[J].IEEE Commun.Survey & Tutorial,First quarter 2005,7(1)
  • 4ZENG Ying-Pei,YANG Kai,GUO Slum-Qing,et al.SWCA:a secure weighted clustering algorithm in wireless ad hoe networks[M].2005
  • 5Christian Prehofer,Christian Bettstetter.Self-organization in communication networks:prineiples & design paradigms[J].IEEE Commun.2005,43
  • 6Wooldridge M,Jennings.Intelligent agent:theory and practice[J].The Knowledge Engineering Review,2002,10(2):115-152
  • 7Rao A S,Georgeff M PJ BDI agents:from theory to practice[J].In Proceedings of the let International Conference on Multi-Agent Systems(ICMAS-95),San Francisco,USA,June,1995:312-319
  • 8Chatterjee M,Das S K Turgnt Wca D.A weighted clustering algorithm for mobile ad hoe networks[J].Journal of Cluster Computing,2002,5(2):193-204

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部