Optimizing Authentication Mechanisms Using ID-Based Cryptography in Ad Hoc Wireless Mobile Networks.
Wonjun LeeWiroon SriborriruxPublished in: ICOIN (2004)
Keyphrases
- mobile networks
- mobile users
- wireless networks
- public key cryptography
- public key
- mobile devices
- key distribution
- base station
- ad hoc networks
- security mechanisms
- cellular networks
- key management
- mobile ad hoc networks
- wifi
- mobile nodes
- multimedia content
- cellular automata
- provably secure
- call admission control
- signature scheme
- security analysis
- authentication protocol
- security services
- key agreement
- routing problem
- wireless communication
- context aware
- mobile phone
- multi hop
- wireless lan