ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Network
The SIJ Transactions on Computer Science Engineering & its Applications (CSEA)
◽
10.9756/sijcsea/v5i4/05010220101
◽
2017
◽
Vol 05
(04)
◽
pp. 21-25
Author(s):
Kalaiselvi C
◽
Aruna Senbagam G
Keyword(s):
Data Transmission
◽
Key Management
◽
Ad Hoc Network
◽
Ad Hoc
◽
Vehicular Ad Hoc Network
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
Download Full-text
Related Documents
Cited By
References
A Survey on Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Network
The SIJ Transactions on Computer Networks & Communication Engineering
◽
10.9756/sijcnce/v6i2/05010210101
◽
2018
◽
Vol 06
(02)
◽
pp. 10-14
Author(s):
Kalaiselvi C
◽
Aruna Senbagam G
Keyword(s):
Data Transmission
◽
Key Management
◽
Ad Hoc Network
◽
Ad Hoc
◽
Vehicular Ad Hoc Network
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
Download Full-text
Reply to Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks”
IEEE Transactions on Intelligent Transportation Systems
◽
10.1109/tits.2019.2925097
◽
2019
◽
Vol 20
(9)
◽
pp. 3595-3595
◽
Cited By ~ 2
Author(s):
Maria Azees
Keyword(s):
Ad Hoc Networks
◽
Data Transmission
◽
Key Management
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
◽
Hoc Networks
Download Full-text
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
IEEE Transactions on Intelligent Transportation Systems
◽
10.1109/tits.2015.2492981
◽
2016
◽
Vol 17
(4)
◽
pp. 1015-1028
◽
Cited By ~ 89
Author(s):
Pandi Vijayakumar
◽
Maria Azees
◽
Arputharaj Kannan
◽
Lazarus Jegatha Deborah
Keyword(s):
Ad Hoc Networks
◽
Data Transmission
◽
Key Management
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
◽
Hoc Networks
Download Full-text
Comments on “Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks”
IEEE Transactions on Intelligent Transportation Systems
◽
10.1109/tits.2017.2746880
◽
2018
◽
Vol 19
(7)
◽
pp. 2149-2151
◽
Cited By ~ 18
Author(s):
Haowen Tan
◽
Dongmin Choi
◽
Pankoo Kim
◽
Sungbum Pan
◽
Ilyong Chung
Keyword(s):
Ad Hoc Networks
◽
Data Transmission
◽
Key Management
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
◽
Hoc Networks
Download Full-text
Secure Data Transmission with Effective Routing Method Using Group Key Management Techniques-A Survey
Journal Européen des Systèmes Automatisés
◽
10.18280/jesa.520305
◽
2019
◽
Vol 52
(3)
◽
pp. 253-256
Author(s):
Rajesh Yamparala
◽
Balamurugan Perumal
Keyword(s):
Data Transmission
◽
Key Management
◽
Group Key Management
◽
Group Key
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
◽
Routing Method
Download Full-text
Cluster-Based Secure Data Transmission Solution for Ad Hoc Network
Agent Computing and Multi-Agent Systems - Lecture Notes in Computer Science
◽
10.1007/11802372_86
◽
2006
◽
pp. 728-733
Author(s):
Hwan-Seok Yang
◽
Joung-Min Kim
◽
Seung-Kyu Park
Keyword(s):
Data Transmission
◽
Ad Hoc Network
◽
Ad Hoc
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Secure Data Transmission in VANETs Using Efficient Key-Management Techniques
Intelligent Communication Technologies and Virtual Mobile Networks - Lecture Notes on Data Engineering and Communications Technologies
◽
10.1007/978-3-030-28364-3_50
◽
2019
◽
pp. 494-503
Author(s):
Mahalakshmi Gopalakrishnan
◽
Uma Elangovan
Keyword(s):
Data Transmission
◽
Key Management
◽
Secure Data
◽
Secure Data Transmission
◽
Management Techniques
Download Full-text
Performance Evaluation of BDAG Aided Blockchain Technology in Clustered Mobile Ad-Hoc Network for Secure Data Transmission
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2021.01212116
◽
2021
◽
Vol 12
(12)
◽
Author(s):
B. Harikrishnan
◽
T. Balasubaramanian
Keyword(s):
Performance Evaluation
◽
Data Transmission
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Blockchain Technology
◽
Secure Data
◽
Secure Data Transmission
◽
Mobile Ad Hoc
Download Full-text
Efficient Decentralized Key Management Approach for Vehicular Ad Hoc Network
Data, Engineering and Applications
◽
10.1007/978-981-13-6351-1_13
◽
2019
◽
pp. 147-161
Author(s):
Shikha Rathore
◽
Jitendra Agrawal
◽
Sanjeev Sharma
◽
Santosh Sahu
Keyword(s):
Key Management
◽
Ad Hoc Network
◽
Ad Hoc
◽
Vehicular Ad Hoc Network
◽
Management Approach
Download Full-text
Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network
Computers & Electrical Engineering
◽
10.1016/j.compeleceng.2019.03.007
◽
2019
◽
Vol 76
◽
pp. 94-110
◽
Cited By ~ 7
Author(s):
N. Alangudi Balaji
◽
R. Sukumar
◽
M. Parvathy
Keyword(s):
Key Management
◽
Ad Hoc Network
◽
Ad Hoc
◽
Vehicular Ad Hoc Network
◽
Data Authentication
◽
Management Scheme
◽
Key Management Scheme
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close