{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T03:10:30Z","timestamp":1705029030140},"reference-count":36,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2004,7]]},"DOI":"10.1016\/j.adhoc.2004.03.005","type":"journal-article","created":{"date-parts":[[2004,4,21]],"date-time":"2004-04-21T12:48:18Z","timestamp":1082551698000},"page":"291-307","source":"Crossref","is-referenced-by-count":52,"title":["TIDS: threshold and identity-based security scheme for wireless ad hoc networks"],"prefix":"10.1016","volume":"2","author":[{"given":"Hongmei","family":"Deng","sequence":"first","affiliation":[]},{"given":"Dharma P.","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2004.03.005_BIB1","series-title":"Introduction to Wireless and Mobile Systems","author":"Agrawal","year":"2002"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB2","series-title":"Ad Hoc Networking","first-page":"139","article-title":"Dynamic source routing in ad hoc networks","author":"Johnson","year":"2001"},{"issue":"11","key":"10.1016\/j.adhoc.2004.03.005_BIB3","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB4","unstructured":"A. Shamir, Identity based cryptosystems and signatures Schemes, in: Proceedings of the Advances in Cryptology, 1984"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB5","doi-asserted-by":"crossref","unstructured":"R. Hauser, A. Przygienda, G. Tsudik, Reducing the cost of security in link state routing, in: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS'97), 1997, pp. 93\u201399","DOI":"10.1109\/NDSS.1997.579226"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB6","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, S. Wetzel, Stealth attacks on ad-hoc wireless networks, in: Proceedings of Vehicular Technology Conference, 2003","DOI":"10.1109\/VETECF.2003.1285396"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB7","unstructured":"A. Perrig, Y.C. Hu, D.B. Johnson, Wormhole protection in wireless ad hoc networks, Technical Report TR01-384, Department of Computer Science, Rice University, December 2001"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB8","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","article-title":"A modular approach to key safeguarding","volume":"IT-29","author":"Asmuth","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB9","doi-asserted-by":"crossref","unstructured":"S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th International Conference on Mobile Computing and Networking (MOBICOM'00), August 2000, pp. 255\u2013265","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB10","unstructured":"H. Deng, Q.-A. Zeng, D.P. Agrawal, SVM-based intrusion detection system for wireless ad hoc networks, IEEE Vehicular Technology Conference, Orlando, October 6\u20139, 2003"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB11","series-title":"Advances in Cryptology, CRYPTO 2001","article-title":"Identity-based encryption from Weil pairing","volume":"vol. 2139","author":"Bonh","year":"2001"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB12","doi-asserted-by":"crossref","unstructured":"C. Cocks, An identity based encryption scheme based on quadratic residues, in: B. Honary (Ed.), Cryptography and Coding, Lecture Notes in Computer Science, vol. 2260, Springer, Berlin, 2001","DOI":"10.1007\/3-540-45325-3_32"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB13","series-title":"Proceedings of the 9th Workshop on Selective Areas on Cryptography (SAC 2002)","article-title":"Efficient identity based signature schemes based on pairings","volume":"vol. 2595","author":"Hess","year":"2002"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB14","unstructured":"J.C. Cha, J.H. Cheon, An identity-based signature from Gap Diffie\u2013Hellman groups, Cryptology ePrint Archive, Report 2002\/018. Available from "},{"key":"10.1016\/j.adhoc.2004.03.005_BIB15","doi-asserted-by":"crossref","unstructured":"K.G. Paterson, ID-based signatures from pairing on elliptic curves, Cryptology ePrint Archive, Report 2002\/004. Available from ","DOI":"10.1049\/el:20020682"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB16","unstructured":"R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, SCIS' 2000, 2000"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB17","unstructured":"H.Y. Jung, D.H. Lee, J. Lim, K.S. Chang, Signcryption schemes with forward secrecy, WISA, vol. 2, 2001, pp. 403\u2013475"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB18","unstructured":"J. Malonee-Lee, Identity-based signcryption, Cryptology ePrint Archive, Report 2002\/098. Available from "},{"key":"10.1016\/j.adhoc.2004.03.005_BIB19","unstructured":"J. Malonee-Lee, Signcryption with non-repudiation, Technical Report CSTR-02-004, Department of Computer Science, University of Bristol, June 2002"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB20","first-page":"105","article-title":"Some ideal secret sharing schemes","volume":"6","author":"Brickell","year":"1989","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB21","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","article-title":"On secret sharing systems","volume":"IT-29","author":"Karnin","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB22","doi-asserted-by":"crossref","unstructured":"T.P. Pederson, Non-interactive and information-theoretic secure verifiable secret sharing, Lecture Notes in Computer Science, 1992, pp. 129\u2013140","DOI":"10.1007\/3-540-46766-1_9"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB23","unstructured":"Y. Desmedt, S. Jajodia, Redistribution secret shares to new access structures and its applications, Technical Report ISSE TR-97-01, George Mason University, Fairfax, VA, July 1997"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB24","doi-asserted-by":"crossref","unstructured":"Y. Zheng, Signcryption and its applications in efficient public key solutions, in: Proceedings of the 1st International Information Security Workshop, 1997, pp. 291\u2013312","DOI":"10.1007\/BFb0030430"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB25","unstructured":"B. Dahill, B.N. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001"},{"issue":"3","key":"10.1016\/j.adhoc.2004.03.005_BIB26","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/581291.581312","article-title":"Secure ad hoc on-demand distance vector routing","volume":"6","author":"Zapata","year":"2002","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB27","unstructured":"Y.C. Hu, D.B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing in mobile wireless ad-hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), 2002, pp. 3\u201313"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB28","doi-asserted-by":"crossref","unstructured":"Y.C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, September 2002","DOI":"10.1145\/570645.570648"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB29","unstructured":"P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002"},{"issue":"6","key":"10.1016\/j.adhoc.2004.03.005_BIB30","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","article-title":"Securing ad hoc networks","volume":"13","author":"Zhou","year":"1999","journal-title":"IEEE Network"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB31","unstructured":"A. Perrig, R. Canetti, B. Whillock, TELSA: Multicast Source Authentication Transform Specification, draft-ietf-msec-tesla-spec-00, October 2002"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB32","unstructured":"J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, in: Proceedings of the IEEE 9th International Conference on Network Protocols (ICNP'01), 2001"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB33","doi-asserted-by":"crossref","unstructured":"A. Khalili, J. Katz, W. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, January 28, 2003","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB34","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom'2000), August 2000","DOI":"10.1145\/345910.345958"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB35","unstructured":"S. Yi, R. Kravets, MOCA: mobile certificate authority for wireless ad hoc networks, in: Proceedings of the 2nd Annual PKI Research Workshop Program (PKI 03), Gaithersburg, MD, April 2003"},{"key":"10.1016\/j.adhoc.2004.03.005_BIB36","unstructured":"K. Fall, E. Varadhanm, The ns Manual (Formerly ns Notes and Documentation), 2000"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870504000216?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870504000216?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T16:30:15Z","timestamp":1585758615000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870504000216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["S1570870504000216"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.adhoc.2004.03.005","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":["Computer Networks and Communications","Hardware and Architecture","Software"],"published":{"date-parts":[[2004,7]]}}}