Hoeper, K., & Gong, G. (2007). Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes Y. Xiao and Y. Pan (Eds.), World Scientific Publishing Co.
Reference author: K. Hoeper
First name
K.
Last name
Hoeper
Hoeper, K., & Gong, G. (2007). Pre-Authentication and Authentication Models in Ad Hoc Networks edited by Y. Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag.
Hoeper, K., & Gong, G. (2007). Preventing or utilizing key escrow in identity-based schemes employed in mobile ad hoc networks International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Networks, 2, 239-250. (Original work published 2007)