Search Results

There are 7080036 results for: content related to: Public Key Infrastructure for Vehicle Networks

  1. Public-Key Infrastructure

    Wireless Mobile Internet Security, Second Edition

    Man Young Rhee, Pages: 249–289, 2013

    Published Online : 25 MAR 2013, DOI: 10.1002/9781118512920.ch7

  2. Privacy Protection Against Certificate Authorities

    Vehicle Safety Communications: Protocols, Security, and Privacy

    Luca Delgrossi, Tao Zhang, Pages: 295–314, 2012

    Published Online : 13 SEP 2012, DOI: 10.1002/9781118452189.ch19

  3. Public Key Infrastructure (PKI)

    Standard Article

    The Internet Encyclopedia

    Russ Housley

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie149

  4. Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 49–57, Xixiang Lv, Hui Li and Baocang Wang

    Article first published online : 9 MAY 2012, DOI: 10.1002/sec.529

  5. Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 146–162, Sudip Misra, Sumit Goswami, Gyan Prakash Pathak and Nirav Shah

    Article first published online : 1 OCT 2009, DOI: 10.1002/wcm.839

  6. Public Key Crypto

    Information Security: Principles and Practice

    Mark Stamp, Pages: 61–84, 2005

    Published Online : 28 OCT 2005, DOI: 10.1002/0471744190.ch4

  7. PKI: Public Key Infrastructure: Fundamentals and Support for IPsec and Mobility

    AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

    Madjid Nakhjiri, Mahsa Nakhjiri, Pages: 203–233, 2006

    Published Online : 3 JAN 2006, DOI: 10.1002/0470017465.ch9

  8. A heterogeneous-network aided public-key management scheme for mobile ad hoc networks

    International Journal of Network Management

    Volume 17, Issue 1, January/February 2007, Pages: 3–15, Yuh-Min Tseng

    Article first published online : 10 FEB 2006, DOI: 10.1002/nem.603

  9. A robust self-organized public key management for mobile ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 1, January/February 2010, Pages: 16–30, Hisham Dahshan and James Irvine

    Article first published online : 3 AUG 2009, DOI: 10.1002/sec.131

  10. A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks

    Wireless Communications and Mobile Computing

    Volume 12, Issue 2, 10 February 2012, Pages: 145–157, Hyunjue Kim, Chang Hyun Kim and Jong-Moon Chung

    Article first published online : 1 MAR 2010, DOI: 10.1002/wcm.947

  11. Public Key Crypto

    Information Security: Principles and Practice, Second Edition

    Mark Stamp, Pages: 89–123, 2011

    Published Online : 9 SEP 2011, DOI: 10.1002/9781118027974.ch4

  12. Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 535–545, Shane Balfe, Andrew D. McDonald, Kenneth G. Paterson and Helen Phillips

    Article first published online : 10 SEP 2009, DOI: 10.1002/sec.145

  13. Trust coercion in the name of usable public key infrastructure

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1734–1745, Dimitrios Zissis and Dimitrios Lekkas

    Article first published online : 31 AUG 2013, DOI: 10.1002/sec.870

  14. Cryptographic Algorithms and Protocols for XG

    Next Generation Mobile Systems 3G and Beyond

    Craig Gentry, Zulfikar Ramzan, Pages: 285–314, 2005

    Published Online : 30 JUN 2005, DOI: 10.1002/0470091533.ch10

  15. Secure and robust threshold key management (SRKM) scheme for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 517–534, K. Hamouid and K. Adi

    Article first published online : 17 FEB 2010, DOI: 10.1002/sec.199

  16. Authentication of Subjects

    Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

    Stuart Jacobs, Pages: 119–166, 2011

    Published Online : 24 OCT 2011, DOI: 10.1002/9780470947913.ch4

  17. PKI Systems

    Network Security: Current Status and Future Directions

    Christos Douligeris, Dimitrios N. Serpanos, Pages: 409–418, 2006

    Published Online : 14 JUN 2006, DOI: 10.1002/9780470099742.ch23

  18. Generating certification authority authenticated public keys in ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 87–106, G. Kounga, C. J. Mitchell and T. Walter

    Article first published online : 13 DEC 2010, DOI: 10.1002/sec.279

  19. Knowledge Issues Raised in Modelling Trust in a Public Key Infrastructure

    Expert Systems

    Volume 18, Issue 5, November 2001, Pages: 233–249, A. Basden, E. Ball and D.W. Chadwick

    Article first published online : 16 DEC 2002, DOI: 10.1111/1468-0394.00178

  20. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1165