Hoeper, K. ., & Gong, G. . (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes. Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.
Reference author: K. Hoeper
First name
K.
Last name
Hoeper
Hoeper, K. ., & Gong, G. . (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks. edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag.
Hoeper, K. ., & Gong, G. . (2007). Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, 2, 239-250. (Original work published 2007)