References
- A. Shamir, How to Share a Secret. Commun. ACM. (1979), vol.22, pp.612-613. https://doi.org/10.1145/359168.359176
- L. Zhou and Z. J. Haas, Securing Ad Hoc Networks. IEEE Network Mag. (1999), vol.13, no.6, pp.24-30.
- Y. G. Desmedt, Threshold Cryptography. European Transactions on Telecommunication. (1994), vol.5, no.4, pp.449-457. https://doi.org/10.1002/ett.4460050407
- S. Yi and R. Kravets, MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks. Report No. UIUCDCS-R-2004-2502, UILU-ENG-2004-1805, University of Illinois at Urbana-Champaign, (2002).
- B. Wu, Jie Wu and Eduardo B. Fernandez, Secure and Efficient Key Management in Mobile Ad Hoc Networks. Proc. IPDPS'05. (2005).
- J. Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. Proc. 9th Int'l. Conf. Network Protocols(ICNP'01). (2001), pp.251-260.
- D. Joshi, K. Namuduri, and P. Pendse, Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks : An Analysis. EURASIP J. Wireless Commun. and Net. (2005), vol.5, no.4, pp.579-589.
- B. Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli and Guilin Wang, Efficient and Robust Key Management for Large Mobile Ad Hoc Networks. Computer Networks. (2005), vol.48, no.4, pp.657-682. https://doi.org/10.1016/j.comnet.2004.11.023
- Jun-Yop Kim, Public Key Authentication using (t, n) Threshold Scheme in WSN. KNDU(Korea National Defense University). (2009), pp.17-26.
- T. El Gamal, A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Trans. Inform. Theory. (1985), pp.469-472.
- Alfred J. Menezes, Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers. (1993), pp.35-42.
- W. Diffie and M. E. Hellman, New Directions in Cryptography. IEEE Trans. Inform. Theory, IT-22(6). (1976), pp.644-654.
- R.L., Rivest, A. Shamir, and L.A. Adleman, A method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. (1978), vol.21, no.2, pp.120-126. https://doi.org/10.1145/359340.359342
- Min-Sop Lee, Number Theory and Cryptology. Kyowoo. (2008), pp.165-172.
- Neal Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation. (1987), vol.48, no.177, pp.203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Taeg-Hee Lee, Chang-Ho Seo, Young-Cheol Kim, Tae-Hun Lee and Bo-Hyun Yun, Elliptic Curve Cryptography Algorithms for IC Card. Journal of KIISE : Computing Practices and Letters. (2004), vol.10, no.4, pp.319-327.