English   español  
Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/9877
Compartir / Impacto:
Estadísticas
Add this article to your Mendeley library MendeleyBASE
Citado 10 veces en Web of Knowledge®  |  Ver citas en Google académico
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL
Exportar otros formatos: Exportar EndNote (RIS)Exportar EndNote (RIS)Exportar EndNote (RIS)
Título

Cryptographic techniques for mobile ad-hoc networks

Autor Daza, Vanesa; Herranz, Javier; Morillo, Paz; Ràfols, Carla
Palabras clave Mobile ad-hoc networks
Secret sharing techniques
Identity-based cryptography
Threshold cryptography
Fecha de publicación 26-ago-2007
EditorElsevier
Citación Computer Networks 51(18): 4938-4950 (2007)
ResumenIn this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.
Descripción 13 pages.-- Printed version published on Dec 19, 2007.
Versión del editorhttp://dx.doi.org/10.1016/j.comnet.2007.08.002
URI http://hdl.handle.net/10261/9877
DOI10.1016/j.comnet.2007.08.002
ISSN1389-1286
Aparece en las colecciones: (IIIA) Artículos
Ficheros en este ítem:
No hay ficheros asociados a este ítem.
Mostrar el registro completo
 



NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.