Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN.
Geetanjali RatheeHemraj SainiPublished in: Int. J. Inf. Secur. Priv. (2018)
Keyphrases
- elliptic curve cryptography
- wireless mesh networks
- mobile ad hoc networks
- routing protocol
- authentication scheme
- elliptic curve
- security analysis
- public key
- public key cryptography
- ad hoc networks
- wireless networks
- high security
- digital watermark
- error correction
- power supply
- routing algorithm
- security protocols
- key management
- user authentication
- secret key
- authentication protocol
- security requirements
- end to end
- wireless sensor networks
- digital signature
- digital libraries
- efficient computation
- energy consumption
- digital images
- mobile devices