Login / Signup
Secure Wireless Ad Hoc Networks using Zero Knowledge Proof.
Benfano Soewito
Yonathan Marcellinus
Manik Hapsara
Published in:
J. Comput. Sci. (2014)
Keyphrases
</>
wireless ad hoc networks
key management
ad hoc networks
end to end
multipath
wireless networks
multi hop
wireless sensor networks
resource constrained
routing protocol
distributed computing
security protocols
security mechanisms
network topology
wireless channels