Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/9877
COMPARTIR / EXPORTAR:
logo share SHARE logo core CORE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE

Invitar a revisión por pares abierta
Título

Cryptographic techniques for mobile ad-hoc networks

AutorDaza, Vanesa; Herranz, Javier; Morillo, Paz; Rafols, Carla
Palabras claveMobile ad-hoc networks
Secret sharing techniques
Identity-based cryptography
Threshold cryptography
Fecha de publicación26-ago-2007
EditorElsevier
CitaciónComputer Networks 51(18): 4938-4950 (2007)
ResumenIn this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.
Descripción13 pages.-- Printed version published on Dec 19, 2007.
Versión del editorhttp://dx.doi.org/10.1016/j.comnet.2007.08.002
URIhttp://hdl.handle.net/10261/9877
DOI10.1016/j.comnet.2007.08.002
ISSN1389-1286
Aparece en las colecciones: (IIIA) Artículos

Mostrar el registro completo

CORE Recommender

SCOPUSTM   
Citations

24
checked on 08-abr-2024

WEB OF SCIENCETM
Citations

15
checked on 22-feb-2024

Page view(s)

358
checked on 18-abr-2024

Google ScholarTM

Check

Altmetric

Altmetric


NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.