Search Results

There are 531432 results for: content related to: Public Key Infrastructure for Vehicle Networks

  1. Public-Key Infrastructure

    Wireless Mobile Internet Security, Second Edition

    Man Young Rhee, Pages: 249–289, 2013

    Published Online : 25 MAR 2013, DOI: 10.1002/9781118512920.ch7

  2. Public Key Infrastructure (PKI)

    Standard Article

    The Internet Encyclopedia

    Russ Housley

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie149

  3. The Dream of PKI

    Cryptography Engineering

    Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Pages: 275–280, 2015

    Published Online : 9 OCT 2015, DOI: 10.1002/9781118722367.ch18

  4. Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 49–57, Xixiang Lv, Hui Li and Baocang Wang

    Version of Record online : 9 MAY 2012, DOI: 10.1002/sec.529

  5. Generating certification authority authenticated public keys in ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 87–106, G. Kounga, C. J. Mitchell and T. Walter

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.279

  6. Equivalent public keys and a key substitution attack on the schemes from vector decomposition

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1274–1282, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Version of Record online : 1 SEP 2013, DOI: 10.1002/sec.860

  7. Public Key Crypto

    Information Security: Principles and Practice, Second Edition

    Mark Stamp, Pages: 89–123, 2011

    Published Online : 9 SEP 2011, DOI: 10.1002/9781118027974.ch4

  8. Privacy Protection Against Certificate Authorities

    Vehicle Safety Communications: Protocols, Security, and Privacy

    Luca Delgrossi, Tao Zhang, Pages: 295–314, 2012

    Published Online : 13 SEP 2012, DOI: 10.1002/9781118452189.ch19

  9. Trust coercion in the name of usable public key infrastructure

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1734–1745, Dimitrios Zissis and Dimitrios Lekkas

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.870

  10. A limitation on security evaluation of cryptographic primitives with fixed keys

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1663–1675, Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta and Noboru Kunihiro

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1457

  11. Key-Exchange Algorithms

    Applied Cryptography, Second Edition, 20th Anniversary Edition

    Bruce Schneier, Pages: 513–525, 2015

    Published Online : 9 OCT 2015, DOI: 10.1002/9781119183471.ch22

  12. Public-Key Cryptography and Key Management

    Introduction to Network Security: Theory and Practice

    Jie Wang, Zachary A. Kissel, Pages: 93–128, 2016

    Published Online : 1 JAN 2016, DOI: 10.1002/9781119113102.ch3

  13. Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 146–162, Sudip Misra, Sumit Goswami, Gyan Prakash Pathak and Nirav Shah

    Version of Record online : 1 OCT 2009, DOI: 10.1002/wcm.839

  14. Public Key Crypto

    Information Security: Principles and Practice

    Mark Stamp, Pages: 61–84, 2005

    Published Online : 28 OCT 2005, DOI: 10.1002/0471744190.ch4

  15. PKI Practicalities

    Cryptography Engineering

    Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Pages: 295–300, 2015

    Published Online : 9 OCT 2015, DOI: 10.1002/9781118722367.ch20

  16. Pki and Certificate Authorities

    Computer Security Handbook, Sixth Edition

    Santosh Chokhani, Padgett Peterson, Steven Lovaas, Pages: 37.1–37.29, 2015

    Published Online : 12 SEP 2015, DOI: 10.1002/9781118851678.ch37

  17. A heterogeneous-network aided public-key management scheme for mobile ad hoc networks

    International Journal of Network Management

    Volume 17, Issue 1, January/February 2007, Pages: 3–15, Yuh-Min Tseng

    Version of Record online : 10 FEB 2006, DOI: 10.1002/nem.603

  18. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  19. A robust self-organized public key management for mobile ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 1, January/February 2010, Pages: 16–30, Hisham Dahshan and James Irvine

    Version of Record online : 3 AUG 2009, DOI: 10.1002/sec.131

  20. Introduction to Cryptography

    Cryptography Engineering

    Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, Pages: 23–39, 2015

    Published Online : 9 OCT 2015, DOI: 10.1002/9781118722367.ch2