메뉴 건너뛰기




Volumn E89-D, Issue 3, 2006, Pages 1288-1289

Zero-knowledge hierarchical authentication in MANETs

Author keywords

Algorithms; Authentication; Wireless networks

Indexed keywords

ALGORITHMS; MOBILE COMPUTING; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 33645787069     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e89-d.3.1288     Document Type: Conference Paper
Times cited : (9)

References (6)
  • 1
    • 3042520226 scopus 로고    scopus 로고
    • Report on a working session on security in wireless ad hoc networks
    • L. Buttyan and J. Hubaux, ''Report on a working session on security in wireless ad hoc networks," ACM Mobile Comput. Commun. Rev., vol.7, no. 1. pp.74-94, 2003.
    • (2003) ACM Mobile Comput. Commun. Rev. , vol.7 , Issue.1 , pp. 74-94
    • Buttyan, L.1    Hubaux, J.2
  • 2
    • 24144474284 scopus 로고    scopus 로고
    • Strong identification based on a hard-on-average problem
    • May
    • P. Caballero-Gil, "Strong identification based on a hard-on-average problem," IEICE Trans. Fundamentals, vol.E88-A, no.5, pp. 1117-1121, May 2005.
    • (2005) IEICE Trans. Fundamentals , vol.E88-A , Issue.5 , pp. 1117-1121
    • Caballero-Gil, P.1
  • 6
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas, "Securing ad hoc networks." IEEE Netw., vol.13, no.6, pp.24-30, 1999.
    • (1999) IEEE Netw. , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.