13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

174 H.-P. Bischof, A. Kam<strong>in</strong>sky, and J. B<strong>in</strong>derConclusionWe present a dynamic, fault--tolerant symmetric key management system. Unlikeother key management paradigms, our approach does not require a specific order <strong>in</strong>which contributions are collected, nor does it rely on a trusted or centralized entity tocomb<strong>in</strong>e the partial keys.References1. S. Capkun, L. Buttyan, and J. Hubaux. Self-organized public-key management for mobilead hoc networks, 2002.2. D. Gelernter. Generative communication <strong>in</strong> L<strong>in</strong>da. ACM Transactions on Programm<strong>in</strong>gLanguages and Systems, 7(1):80-112, January 1985.3. Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force. IP Rout<strong>in</strong>g for Wireless/Mobile Hosts (mobileip) Work<strong>in</strong>gGroup. http://www.ietf.org/html.charters/mobileip-charter.html.4. A. Kam<strong>in</strong>sky, Hans-Peter Bischof. Many-to-Many Invocation: A new object oriented paradigmfor ad hoc collaborative systems. 17th Annual ACM Conference on Object OrientedProgramm<strong>in</strong>g Systems, Languages, and Applications (OOPSLA 2002), Onward! track, November2002, to appear. Prepr<strong>in</strong>t:http://www.cs.rit.edu/~anh<strong>in</strong>ga/publications/publications.shtml5. Yongdae Kim, Adrian Perrig, and Gene Tsudik. Simple and fault-tolerant key agreement fordynamic collaborative groups. In Proceed<strong>in</strong>gs of the 7th ACM conference on <strong>Computer</strong>and communications security, pages 235244, 20006. H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks,2000.7. Michael Ste<strong>in</strong>er, Gene Tsudik, and Michael Waidner. CLIQUES: A new approach to groupkey agreement. In Proceed<strong>in</strong>gs of the 18th International Conference on Distributed Comput<strong>in</strong>gSystems (ICDCS98), pages 380387, Amsterdam, 1998. IEEE <strong>Computer</strong> Society Press.8. Jefferson S, Tuttle. Security <strong>in</strong> an Ad Hoc Network us<strong>in</strong>g Many-to-Many Invocation,http://www.cs.rit.edu/~jst17349. A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Comput<strong>in</strong>gSystems, 9(4):265-290, Fall 1996.10. S.-M. Yoo and Z.-H. Zhou. All-to-all communication <strong>in</strong> wireless ad hoc networks. In Proceed<strong>in</strong>gsof the 39 th Annual ACM Southeast Conference, pages 180-181, March 2001.http://webster.cs.uga.edu/~jam/acm-se/review/abstract/syoo.ps.11. Lidong Zhou and Zygmunt J. Haas. Secur<strong>in</strong>g ad hoc networks. IEEE Network, 13(6):2430,1999.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!