Hoeper, K. ., & Gong, G. . (2005). Identity-Based Key Exchange Protocols for Ad Hoc Networks. Montreal, Canada. (Original work published 2005)
Reference author: Katrin Hoeper
First name
Katrin
Last name
Hoeper
Hoeper, K. ., & Gong, G. . (2005). Limitations of Key Escrow in Ad Hoc Networks. Athens, Greece. (Original work published 2005)
Hoeper, K. ., & Gong, G. . (2005). Pre-Authentication and Authentication Models in AdHocNetworks. Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Hoeper, K. ., & Gong, G. . (2006). Integrated DH-like key exchange protocols from LUC, GH and XTR. Proceedings of International Symposium on Information Theory(ISIT 2006).
Hoeper, K. ., & Gong, G. . (2006). Key revocation for identity-based schemes in mobile ad hoc networks. Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, 4104, 224-237.