The Application of ECDSA on Ad-Hoc Networks

碩士 === 長庚大學 === 電機工程研究所 === 95 === Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these netwo...

Full description

Bibliographic Details
Main Authors: Yi-Yin Lai, 賴宜潁
Other Authors: Erl-Huei Lu
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/72638301402198803060
id ndltd-TW-095CGU00442036
record_format oai_dc
spelling ndltd-TW-095CGU004420362017-01-15T04:05:23Z http://ndltd.ncl.edu.tw/handle/72638301402198803060 The Application of ECDSA on Ad-Hoc Networks 橢圓曲線於Ad-hoc網路安全上之應用 Yi-Yin Lai 賴宜潁 碩士 長庚大學 電機工程研究所 95 Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. Generally, public key infrastructures are assumed to be unavailable in ad-hoc network. The key exchange problem for this type of network has now become important and interesting. In this paper, a secured identity-based key exchange protocol based on elliptic curve cryptography is proposed for networks in environments without any public key infrastructure. Erl-Huei Lu 盧而輝 2007 學位論文 ; thesis 0 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 長庚大學 === 電機工程研究所 === 95 === Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. Generally, public key infrastructures are assumed to be unavailable in ad-hoc network. The key exchange problem for this type of network has now become important and interesting. In this paper, a secured identity-based key exchange protocol based on elliptic curve cryptography is proposed for networks in environments without any public key infrastructure.
author2 Erl-Huei Lu
author_facet Erl-Huei Lu
Yi-Yin Lai
賴宜潁
author Yi-Yin Lai
賴宜潁
spellingShingle Yi-Yin Lai
賴宜潁
The Application of ECDSA on Ad-Hoc Networks
author_sort Yi-Yin Lai
title The Application of ECDSA on Ad-Hoc Networks
title_short The Application of ECDSA on Ad-Hoc Networks
title_full The Application of ECDSA on Ad-Hoc Networks
title_fullStr The Application of ECDSA on Ad-Hoc Networks
title_full_unstemmed The Application of ECDSA on Ad-Hoc Networks
title_sort application of ecdsa on ad-hoc networks
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/72638301402198803060
work_keys_str_mv AT yiyinlai theapplicationofecdsaonadhocnetworks
AT làiyíyǐng theapplicationofecdsaonadhocnetworks
AT yiyinlai tuǒyuánqūxiànyúadhocwǎnglùānquánshàngzhīyīngyòng
AT làiyíyǐng tuǒyuánqūxiànyúadhocwǎnglùānquánshàngzhīyīngyòng
AT yiyinlai applicationofecdsaonadhocnetworks
AT làiyíyǐng applicationofecdsaonadhocnetworks
_version_ 1718408000615481344