Threshold Authenticated Key Configuration Scheme Based on Multi-layer Clustering in Mobile Ad Hoc.
Keun-Ho LeeSang-Bum HanHeyi-Sook SuhChong-Sun HwangSangKeun LeePublished in: APWeb Workshops (2006)
Keyphrases
- multi layer
- neural network
- authentication scheme
- clustering algorithm
- neural nets
- feed forward neural networks
- mobile devices
- secure communication
- error back propagation
- key agreement protocol
- key distribution
- genetic algorithm
- data mining
- mobile communication
- single layer
- unsupervised learning
- multiple layers
- face recognition