Who are you? Secure identities in single hop ad hoc networks
From MaRDI portal
Publication:2407629
DOI10.1007/s00446-016-0280-0zbMath1419.68024OpenAlexW2512933543MaRDI QIDQ2407629
Seth Gilbert, Calvin Newport, Chaodong Zheng
Publication date: 6 October 2017
Published in: Distributed Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00446-016-0280-0
Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Resource Burning for Permissionless Systems (Invited Paper) ⋮ A resource-competitive jamming defense
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Consensus and collision detectors in radio networks
- Communication Complexity of Consensus in Anonymous Message Passing Systems
- A jamming-resistant MAC protocol for single-hop wireless networks
- Secure communication over radio channels
- Leveraging Channel Diversity to Gain Efficiency and Robustness for Wireless Broadcast
- A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
- Probability and Computing
- Byzantine agreement with homonyms
- Concentration of Measure for the Analysis of Randomized Algorithms
This page was built for publication: Who are you? Secure identities in single hop ad hoc networks