The Application of ECDSA on Ad-Hoc Networks
碩士 === 長庚大學 === 電機工程研究所 === 95 === Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these netwo...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72638301402198803060 |
id |
ndltd-TW-095CGU00442036 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095CGU004420362017-01-15T04:05:23Z http://ndltd.ncl.edu.tw/handle/72638301402198803060 The Application of ECDSA on Ad-Hoc Networks 橢圓曲線於Ad-hoc網路安全上之應用 Yi-Yin Lai 賴宜潁 碩士 長庚大學 電機工程研究所 95 Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. Generally, public key infrastructures are assumed to be unavailable in ad-hoc network. The key exchange problem for this type of network has now become important and interesting. In this paper, a secured identity-based key exchange protocol based on elliptic curve cryptography is proposed for networks in environments without any public key infrastructure. Erl-Huei Lu 盧而輝 2007 學位論文 ; thesis 0 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 電機工程研究所 === 95 === Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. Generally, public key infrastructures are assumed to be unavailable in ad-hoc network. The key exchange problem for this type of network has now become important and interesting. In this paper, a secured identity-based key exchange protocol based on elliptic curve cryptography is proposed for networks in environments without any public key infrastructure.
|
author2 |
Erl-Huei Lu |
author_facet |
Erl-Huei Lu Yi-Yin Lai 賴宜潁 |
author |
Yi-Yin Lai 賴宜潁 |
spellingShingle |
Yi-Yin Lai 賴宜潁 The Application of ECDSA on Ad-Hoc Networks |
author_sort |
Yi-Yin Lai |
title |
The Application of ECDSA on Ad-Hoc Networks |
title_short |
The Application of ECDSA on Ad-Hoc Networks |
title_full |
The Application of ECDSA on Ad-Hoc Networks |
title_fullStr |
The Application of ECDSA on Ad-Hoc Networks |
title_full_unstemmed |
The Application of ECDSA on Ad-Hoc Networks |
title_sort |
application of ecdsa on ad-hoc networks |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/72638301402198803060 |
work_keys_str_mv |
AT yiyinlai theapplicationofecdsaonadhocnetworks AT làiyíyǐng theapplicationofecdsaonadhocnetworks AT yiyinlai tuǒyuánqūxiànyúadhocwǎnglùānquánshàngzhīyīngyòng AT làiyíyǐng tuǒyuánqūxiànyúadhocwǎnglùānquánshàngzhīyīngyòng AT yiyinlai applicationofecdsaonadhocnetworks AT làiyíyǐng applicationofecdsaonadhocnetworks |
_version_ |
1718408000615481344 |