International Journal of Soft Computing
Year:
2016
Volume:
11
Issue:
3
Page No.
114 - 119
References
Barreto, P.S., H.Y. Kim, B. Lynn and M. Scott, 2002. Efficient Algorithms for Pairing-Based Cryptosystems. In: Advances in Cryptology-CRYPTO'2002. Yung, M. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-44050-5, pp: 354-369.
Bechler, M., H.J. Hof, D. Kraft, F. Pahlke and L. Wolf, 2004. A cluster-based security architecture for ad hoc networks. Proceedings of the 23rd IEEE Annual Joint Conference on Computer and Communications Societies, Volume 4, March 7-11, 2004, Hong Kong, China, pp: 2393-2403.
Boneh, D. and M.K. Franklin, 2001. Identity-based Encryption from the Weil Pairing. In: Advances in Cryptology, Kilian, J. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-42456-7, pp: 213-229.
Hezberg, H., D. Jarecki, H. Krawzyk and M. Young, 1995. Proactive secret sharing or: How to cope with perpetual leakage. Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, August 27-31, 1995, Springer Verlag, London, pp: 339-352.
Luo, H., J. Kong, P. Zerfos, S. Lu and L. Zhang, 2001. Providing robust and ubiquitous security support for mobile ad hoc networks. Proceeding of the 9th International Conference on Network Protocols, November 11-14, 2001, IEEE, Riverside, California, pp: 1-21.
Pease, M., R. Shostak and L. Lamport, 1980. Reaching agreement in the presence of faults. J. ACM., 27: 228-234.
CrossRef | Direct Link | Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
CrossRef | Direct Link | Shamir, A., 1985. Identity-Based Cryptosystems and Signature Schemes. In: Advances in Cryptology, Blakley, G. and D. Chaum (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-15658-1, pp: 47-53.
Zhang, Y., W. Liu and W. Lou, 2005. Anonymous communications in mobile Ad Hoc networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Volume 3, March 13-17, 2005, Miami, USA., pp: 1940-1951.