Anonymity and Security in Mobile Ad Hoc Networks.
Jhansi Vazram BollaValli Kumari VatsavayiJ. V. R. MurthyPublished in: ICDCIT (2012)
Keyphrases
- ring signature scheme
- security properties
- access control
- intrusion detection
- security mechanisms
- security requirements
- statistical databases
- information security
- security issues
- security analysis
- security problems
- payment systems
- designated verifier
- privacy protection
- key management
- network security
- sensitive data
- cryptographic protocols
- individual privacy
- qos routing
- wired networks