Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks.
Shakir M. HussainHussein Al-BahadiliGhassan IssaKhalid Al-ZayyatPublished in: ICWN (2009)
Keyphrases
- authentication scheme
- mobile ad hoc networks
- secret sharing
- secret sharing scheme
- key management
- ad hoc networks
- routing protocol
- secret key
- smart card
- user authentication
- network topology
- encryption scheme
- multipath
- end to end
- multi party
- public key
- security analysis
- routing algorithm
- quality of service
- mobile networks
- wireless networks
- authentication protocol
- wireless sensor networks
- digital images
- peer to peer
- secret image
- low cost
- denoising
- anomaly detection
- high resolution