ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Message Authentication Scheme for Mobile Ad hoc Networks
11th International Conference on Parallel and Distributed Systems (ICPADS'05)
◽
10.1109/icpads.2005.184
◽
2005
◽
Cited By ~ 5
Author(s):
F. Sato
◽
H. Takahira
◽
T. Mizuno
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Message Authentication
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
Arabian Journal for Science and Engineering
◽
10.1007/s13369-012-0318-y
◽
2012
◽
Vol 37
(8)
◽
pp. 2179-2192
◽
Cited By ~ 7
Author(s):
Tameem Eissa
◽
Shukor Abd Razak
◽
Mohd Asri Ngadi
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Lightweight Authentication
Download Full-text
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
◽
10.1016/j.adhoc.2007.11.002
◽
2008
◽
Vol 6
(7)
◽
pp. 1134-1150
◽
Cited By ~ 17
Author(s):
Rehan Akbani
◽
Turgay Korkmaz
◽
G.V.S. Raju
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
◽
10.1109/glocom.2010.5683524
◽
2010
◽
Cited By ~ 5
Author(s):
Xiaohui Liang
◽
Rongxing Lu
◽
Xiaodong Lin
◽
Xuemin Shen
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Location Privacy
◽
Ad Hoc
◽
Message Authentication
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks
International Journal of Communications Network and System Sciences
◽
10.4236/ijcns.2017.1012018
◽
2017
◽
Vol 10
(12)
◽
pp. 299-326
Author(s):
Khaleel Mershad
◽
Ali Hamie
◽
Mohamad Hamze
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Dissemination
◽
Message Authentication
◽
Message Authentication Code
◽
Authentication Code
◽
Secure Data
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A distributed anonymous authentication scheme for mobile ad hoc networks
2011 International Conference on Computer Science and Service System (CSSS)
◽
10.1109/csss.2011.5972203
◽
2011
◽
Author(s):
Tao Zhang
◽
Kang Yue
◽
Yan Suo
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Anonymous Authentication
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Global Authentication Scheme for Mobile Ad-Hoc Networks
Advances in Information and Computer Security - Lecture Notes in Computer Science
◽
10.1007/978-3-540-75651-4_8
◽
2007
◽
pp. 105-120
◽
Cited By ~ 1
Author(s):
P. Caballero-Gil
◽
C. Caballero-Gil
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks
Embedded and Ubiquitous Computing – EUC 2005 Workshops - Lecture Notes in Computer Science
◽
10.1007/11596042_88
◽
2005
◽
pp. 854-863
◽
Cited By ~ 5
Author(s):
Shidi Xu
◽
Yi Mu
◽
Willy Susilo
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A new secure authentication scheme based threshold ECDSA for mobile ad hoc networks
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings (ICWMMN 2006)
◽
10.1049/cp:20061574
◽
2006
◽
Cited By ~ 2
Author(s):
Wang Hao
◽
Xiong Wei
◽
Tan Xin
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Secure Authentication
Download Full-text
An Resilient Hierarchical Authentication Scheme Based Byzantine Attack Detection in Mobile Ad Hoc Networks
Journal of Computational and Theoretical Nanoscience
◽
10.1166/jctn.2017.6868
◽
2017
◽
Vol 14
(11)
◽
pp. 5195-5202
Author(s):
S. Satheeshkumar
◽
N. Sengottaiyan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Authentication Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
An Improved Certificateless Public Key Authentication Scheme for Mobile Ad Hoc Networks Over Elliptic Curves
Pattern Analysis, Intelligent Security and the Internet of Things - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-319-17398-6_30
◽
2015
◽
pp. 327-334
◽
Cited By ~ 1
Author(s):
Shabnam Kasra-Kermanshahi
◽
Mazleena Salleh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Elliptic Curves
◽
Ad Hoc
◽
Authentication Scheme
◽
Public Key
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close