Two-tier authentication for cluster and individual sets in mobile ad hoc networks
From MaRDI portal
Publication:858249
DOI10.1016/J.COMNET.2006.06.010zbMATH Open1152.68367OpenAlexW2171479398MaRDI QIDQ858249FDOQ858249
Authors: Yuh-Ren Tsai, Shiuh-Jeng Wang
Publication date: 9 January 2007
Published in: Computer Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.comnet.2006.06.010
Recommendations
- A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks
- Authentication based on multilayer clustering in ad hoc networks
- Computational Science - ICCS 2004
- Cryptographic techniques for mobile ad-hoc networks
- A key argument scheme for mobile ad hoc networks based on password authentification
Cited In (4)
- Authenticated ad hoc routing at the link layer for mobile systems
- A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
- Authentication based on multilayer clustering in ad hoc networks
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
This page was built for publication: Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q858249)