{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:52Z","timestamp":1725562432322},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540222163"},{"type":"electronic","value":"9783540259800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25980-0_19","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:45:33Z","timestamp":1281314733000},"page":"232-245","source":"Crossref","is-referenced-by-count":6,"title":["Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Charikleia","family":"Zouridaki","sequence":"first","affiliation":[]},{"given":"Brian L.","family":"Mark","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]},{"given":"Roshan K.","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. In: Northsec 1999, Sweden (1999)","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merrit, M.: Encrypted Key Exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1992)","key":"19_CR2","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"crossref","unstructured":"Lucks, S.: Open Key Exchange: How to defeat dictionary attacks without encrypting public Keys. In: Security Protocol Workshop 1997, Ecole Normale Suprieure, Paris (1992)","key":"19_CR3","DOI":"10.1007\/BFb0028161"},{"unstructured":"Jablon, D.P.: Extended password key exchange protocols immune to dictionary attack. In: Proceedings of the WETICE 1997 Workshop on Enterprise Security, Cambridge, MA, USA (1998)","key":"19_CR4"},{"key":"19_CR5","first-page":"97","volume-title":"Symposium on Network and Distributed Systems Security (NDSS 1998)","author":"T. Wu","year":"1998","unstructured":"Wu, T.: The secure remote password protocol. In: Symposium on Network and Distributed Systems Security (NDSS 1998), pp. 97\u2013111. Internet Society, San Diego (1998)"},{"doi-asserted-by":"crossref","unstructured":"Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2001)","key":"19_CR6","DOI":"10.1145\/501416.501437"},{"unstructured":"Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. Technical Report EPFL\/IC\/200234, Swiss Federal Institute of Technology, Lausanne (June 2002)","key":"19_CR7"},{"unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine (1999)","key":"19_CR8"},{"unstructured":"Yi, S., Kravets, R.: Key Management for Heterogeneous Ad Hoc Wireless Networks. Technical Report UIUCDCS-R-2002-2290\/UILU-ENG-2002-1734, University of Illinois at Urbana-Champaign (July 2002)","key":"19_CR9"},{"doi-asserted-by":"crossref","unstructured":"Zhou, L., Schneider, F., van Renesse, R.: COCA: A Secure Distributed On-line Certification Authority. Technical Report, Cornell University (2000) (revised 2002)","key":"19_CR10","DOI":"10.1145\/571637.571638"},{"doi-asserted-by":"crossref","unstructured":"Basu, P., Khan, N., Little, T.D.: A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks. In: Proceedings of Distributed Computing Systems Workshop (2001)","key":"19_CR11","DOI":"10.1109\/CDCS.2001.918738"},{"doi-asserted-by":"crossref","unstructured":"Banerjee, S., Khuller, S.: A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks. In: Proc. of IEEE INFOCOM, pp. 1028\u20131037 (2001)","key":"19_CR12","DOI":"10.1109\/INFCOM.2001.916296"},{"issue":"7","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/49.622910","volume":"15","author":"C.R. Lin","year":"1997","unstructured":"Lin, C.R., Gerla, M.: Adaptive Clustering for Mobile Wireless Networks. IEEE Journal of Selected Areas in Communications\u00a015(7), 1265\u20131275 (1997)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"doi-asserted-by":"crossref","unstructured":"Krishna, P., Vaidya, N., Chatterjee, M., Pradhan, D.: A cluster-based approach for routing in dynamic networks. In: Proc. of ACM SIGCOMM Computer Communication, April 1997, pp. 49\u201365 (1997)","key":"19_CR14","DOI":"10.1145\/263876.263885"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing or: How to Cope with Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"unstructured":"Jarecki, S.: Proactive Secret Sharing and Public Key Cryptosystems. Master\u2019s Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA (September 1995)","key":"19_CR16"},{"key":"19_CR17","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. Proc. of IEEE Fund. Of Comp., Sci., pp. 427\u2013437 (1987)","key":"19_CR19","DOI":"10.1109\/SFCS.1987.4"},{"unstructured":"Zouridaki, C.: Evaluation of the Proactive Public Key and Signature System and a new implementation based on Elliptic Curves. M.S. Thesis, Dept. of ECE, George Mason University (2002)","key":"19_CR20"},{"key":"19_CR21","volume-title":"Smart Card Handbook","author":"W. Rankl","year":"2000","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, Ltd., Chichester (2000)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25980-0_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:02:05Z","timestamp":1605762125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25980-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540222163","9783540259800"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25980-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}