Two-tier authentication for cluster and individual sets in mobile ad hoc networks
From MaRDI portal
(Redirected from Publication:858249)
Recommendations
- A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks
- Authentication based on multilayer clustering in ad hoc networks
- Computational Science - ICCS 2004
- Cryptographic techniques for mobile ad-hoc networks
- A key argument scheme for mobile ad hoc networks based on password authentification
Cited in
(4)- Authenticated ad hoc routing at the link layer for mobile systems
- A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
- Authentication based on multilayer clustering in ad hoc networks
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
This page was built for publication: Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q858249)