Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH.

Jörg Schwenk, Mark Manulis,

In Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, volume 3313, pages 107-124, Springer-Verlag, 2005.

[Springer Link] [PDF] [Bibtex]

tags: ad-hoc, communication, computer, idh, pseudonym, security