ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Global Authentication Scheme for Mobile Ad-Hoc Networks
Advances in Information and Computer Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-75651-4_8
◽
2007
◽
pp. 105-120
◽
Cited By ~ 1
Author(s):
P. Caballero-Gil
◽
C. Caballero-Gil
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
Arabian Journal for Science and Engineering
◽
10.1007/s13369-012-0318-y
◽
2012
◽
Vol 37
(8)
◽
pp. 2179-2192
◽
Cited By ~ 7
Author(s):
Tameem Eissa
◽
Shukor Abd Razak
◽
Mohd Asri Ngadi
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Lightweight Authentication
Start Chat
Download Full-text
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
◽
10.1016/j.adhoc.2007.11.002
◽
2008
◽
Vol 6
(7)
◽
pp. 1134-1150
◽
Cited By ~ 17
Author(s):
Rehan Akbani
◽
Turgay Korkmaz
◽
G.V.S. Raju
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A distributed anonymous authentication scheme for mobile ad hoc networks
2011 International Conference on Computer Science and Service System (CSSS)
◽
10.1109/csss.2011.5972203
◽
2011
◽
Author(s):
Tao Zhang
◽
Kang Yue
◽
Yan Suo
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Anonymous Authentication
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks
Embedded and Ubiquitous Computing – EUC 2005 Workshops - Lecture Notes in Computer Science
◽
10.1007/11596042_88
◽
2005
◽
pp. 854-863
◽
Cited By ~ 5
Author(s):
Shidi Xu
◽
Yi Mu
◽
Willy Susilo
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A new secure authentication scheme based threshold ECDSA for mobile ad hoc networks
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings (ICWMMN 2006)
◽
10.1049/cp:20061574
◽
2006
◽
Cited By ~ 2
Author(s):
Wang Hao
◽
Xiong Wei
◽
Tan Xin
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Secure Authentication
Start Chat
Download Full-text
An Resilient Hierarchical Authentication Scheme Based Byzantine Attack Detection in Mobile Ad Hoc Networks
Journal of Computational and Theoretical Nanoscience
◽
10.1166/jctn.2017.6868
◽
2017
◽
Vol 14
(11)
◽
pp. 5195-5202
Author(s):
S. Satheeshkumar
◽
N. Sengottaiyan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Message Authentication Scheme for Mobile Ad hoc Networks
11th International Conference on Parallel and Distributed Systems (ICPADS'05)
◽
10.1109/icpads.2005.184
◽
2005
◽
Cited By ~ 5
Author(s):
F. Sato
◽
H. Takahira
◽
T. Mizuno
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Message Authentication
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
An Improved Certificateless Public Key Authentication Scheme for Mobile Ad Hoc Networks Over Elliptic Curves
Pattern Analysis, Intelligent Security and the Internet of Things - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-319-17398-6_30
◽
2015
◽
pp. 327-334
◽
Cited By ~ 1
Author(s):
Shabnam Kasra-Kermanshahi
◽
Mazleena Salleh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Elliptic Curves
◽
Ad Hoc
◽
Authentication Scheme
◽
Public Key
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Novel Source Based Min-Max Battery Cost Routing Protocol for Mobile Ad Hoc Networks
CVR Journal of Science & Technology
◽
10.32377/cvrjst0408
◽
2013
◽
Vol 4
(1)
◽
pp. 41-44
Author(s):
Humaira Nishat
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/29
◽
2011
◽
Vol 3
(1)
◽
pp. 72-74
Author(s):
Dhara N Darji
◽
◽
Nita B Thakkar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Threats
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close