Hoeper, K., & Gong, G. (2005). Pre-Authentication and Authentication Models in AdHocNetworks Wireless and Mobile Network Security, Y.Xiao et al. (Eds.).
Reference author: Katrin Hoeper
First name
Katrin
Last name
Hoeper
Hoeper, K., & Gong, G. (2005). Identity-Based Key Exchange Protocols for Ad Hoc Networks Montreal, Canada. (Original work published 2005)
Hoeper, K., & Gong, G. (2005). Limitations of Key Escrow in Ad Hoc Networks Athens, Greece. (Original work published 2005)
Hoeper, K., & Gong, G. (2006). Integrated DH-like key exchange protocols from LUC, GH and XTR Proceedings of International Symposium on Information Theory(ISIT 2006).
Hoeper, K., & Gong, G. (2006). Key revocation for identity-based schemes in mobile ad hoc networks Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, 4104, 224-237.