Login / Signup
Authentication Employing Neighbor Tables in Mobile Ad Hoc Networks.
Dorsaf Azzabi
Kunihito Tanaka
Ushio Yamamoto
Yoshikuni Onozato
Published in:
WINSYS (2008)
Keyphrases
</>
database
databases
nearest neighbor
identity authentication
biometric authentication
authentication scheme
user authentication
factor authentication
database transactions
security mechanisms
real time
key distribution
image authentication
service discovery
tabular data
response time
neighbor selection