Fully distributed certificate authority based on polynomial over elliptic curve for MANET

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed certificate validation in MANET

The need for certificate management in mobile ad hoc networks (MANET) is the background for this report. A prototype implementation of a distributed certificate validation service is presented and evaluated. The proposed design is based on an overlay network of proxy nodes offering certificate validation over the XKMS protocol. The proxy nodes employ cooperative caching in order to offer certif...

متن کامل

Distributed Certificate Authority in Cluster-based Ad hoc networks

The need to secure communication in ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. This makes public key cryptographic services particularly difficult to support. We propose a distributed certificate authority intended for deployment in an NTDR cluster-based architecture. We also outline procedures for maintaining thi...

متن کامل

Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2)

In this paper we present an Elliptic Curve Point Multiplication processor over base fields GF(2), suitable for use in a wide range of commercial cryptography applications. Our design operates in a polynomial basis is fully parameterizable in the irreducible polynomial and the chosen Elliptic Curve over any base Galois Field up to a given size. High performance is achieved by use of a dedicated ...

متن کامل

MiniCA: A Web-Based Certificate Authority

The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to publickey encryption technologies. Digital certificates are vital in improving access to and use of new security technologies. Granting and revocation of digital certificates is overseen ...

متن کامل

Hardware for Collision Search on Elliptic Curve over GF(2)

In this last decade, Elliptic Curve Cryptography (ECC) has gain increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to the high level of security with relatively small keys provided by ECC. Indeed, no sub-exponential algorithms are known to solve the underlying hard problem, namely the Elliptic Curve Discret...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Networked and Distributed Computing

سال: 2014

ISSN: 2211-7946

DOI: 10.2991/ijndc.2014.2.2.1