{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:24:46Z","timestamp":1742394286468,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_26","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"375-389","source":"Crossref","is-referenced-by-count":10,"title":["Public Key Cryptography Sans Certificates in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Nitesh","family":"Saxena","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine\u00a013, 24\u201330 (1999)","journal-title":"IEEE Network Magazine"},{"key":"26_CR2","unstructured":"Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-2000, 30, Dept. of Computer Science, UCLA (2000) Available online at: http:\/\/citeseer.ist.psu.edu\/luo00ubiquitous.html"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for MANET. In: IEEE 9th International Conference on Network Protocols (ICNP), pp. 251\u2013260 (2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1002\/wcm.75","volume":"2","author":"J. Kong","year":"2002","unstructured":"Kong, J., Luo, H., Xu, K., Gu, D.L., Gerla, M., Lu, S.: Adaptive Security for Multi-level Ad-hoc Networks. Journal of Wireless Communications and Mobile Computing (WCMC)\u00a02, 533\u2013547 (2002)","journal-title":"Journal of Wireless Communications and Mobile Computing (WCMC)"},{"key":"26_CR5","unstructured":"Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications (ISCC 2002) (2002)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G., Yi, J.H.: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. In: IEEE International Conference on Network Protocol (ICNP), pp. 336\u2013345 (2003)","DOI":"10.1109\/ICNP.2003.1249783"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., Yi, J.H.: Admission Control in Peer-to-Peer: Design and Performance Evaluation. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 104\u2013114 (2003)","DOI":"10.1145\/986858.986873"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/11496618_27","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"N. Saxena","year":"2005","unstructured":"Saxena, N., Tsudik, G., Yi, J.H.: Identity-based access control for Ad-Hoc groups. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 362\u2013379. Springer, Heidelberg (2005)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM Conference on Computers and Communication Security, pp. 52\u201361 (2003)","DOI":"10.1145\/948109.948119"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A Practical Scheme for Non-interactive Verifiable Secret Sharing. In: 28th Symposium on Foundations of Computer Science (FOCS), pp. 427\u2013437 (1987)","DOI":"10.1109\/SFCS.1987.4"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., Yi, J.H.: Efficient node admission for short-lived mobile ad hoc networks. In: International Conference on Networking Protocols (ICNP) (2005)","DOI":"10.1109\/ICNP.2005.14"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002) (2002)","DOI":"10.1145\/570645.570648"},{"key":"26_CR14","unstructured":"Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Technical Report UM-CS-2001-037, University of Massachusetts (2001)"},{"key":"26_CR15","unstructured":"Hills, R.: Sensing for danger. Science Technology Report (2001) Available at: http:\/\/www.llnl.gov\/str\/JulAug01\/Hills.html"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications (1997) ISBN 0-8493-8523-7","DOI":"10.1201\/9781439821916"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Bazzi, R.A., Konjevod, G.: On the establishment of distinct identities in overlay networks. In: Principles of Distributed Computing (PODC) (2005)","DOI":"10.1145\/1073814.1073873"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"26_CR21","first-page":"469","volume":"IT-31","author":"ElGamal","year":"1999","unstructured":"ElGamal: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions in Information Theory\u00a0IT-31, 469\u2013472 (1999)","journal-title":"IEEE Transactions in Information Theory"},{"key":"26_CR22","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient Signature Generation by Smart Cards. Journal of Cryptology\u00a04, 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"key":"26_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68339-9_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"D. Pointcheval","year":"1996","unstructured":"Pointcheval, D., Stern, J.: Security Proofs for Signature Schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 387\u2013398. Springer, Heidelberg (1996)"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A \u201cparadoxical\u201d solution to the signature problem. In: IEEE Annual Symposium of Foundations of Computer Science (FOCS 1984), pp. 441\u2013448 (1984)","DOI":"10.1109\/SFCS.1984.715946"},{"key":"26_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing\u00a017, 281\u2013308 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"M\u00f6ller, B.: Algorithms for multi-exponentiation. Selected Areas in Cryptography, 165\u2013180 (2001)","DOI":"10.1007\/3-540-45537-X_13"},{"key":"26_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-68697-5_21","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"U.M. Maurer","year":"1996","unstructured":"Maurer, U.M., Wolf, S.: Diffie-Hellman Oracles. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 268\u2013282. Springer, Heidelberg (1996)"},{"key":"26_CR28","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a028, 270\u2013299 (1989)","journal-title":"Journal of Computer and System Sciences"},{"key":"26_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45022-X_42","volume-title":"Automata, Languages and Programming","author":"O. Baudron","year":"2000","unstructured":"Baudron, O., Pointcheval, D., Stern, J.: Extended Notions of Security for Multicast Public Key Cryptosystems. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853, pp. 499\u2013511. Springer, Heidelberg (2000)"},{"key":"26_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 259\u2013274. Springer, Heidelberg (2000)"},{"key":"26_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-24676-3_11","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Boldyreva, A., Palacio, A.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 171\u2013188. Springer, Heidelberg (2004)"},{"key":"26_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"26_CR33","series-title":"Lecture Notes in Computer Science","first-page":"18","volume-title":"Public Key Cryptography - PKC 2003","author":"J. Cha","year":"2002","unstructured":"Cha, J., Cheon, J.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 18\u201330. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T18:25:27Z","timestamp":1736447127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11767480_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}