Threshold Cryptography and Authentication in Ad Hoc Networks Survey and Challenges.
Marianne AzerSherif El-KassasMagdy S. El-SoudaniPublished in: ICSNC (2007)
Keyphrases
- ad hoc networks
- key management
- symmetric key
- wireless ad hoc networks
- routing protocol
- end to end
- routing algorithm
- network topology
- wireless networks
- peer to peer
- mobile wireless
- secure communication
- mac protocol
- mobile ad hoc networks
- end to end delay
- quality of service
- base station
- multi hop
- key distribution
- wireless mesh networks
- mobile networks
- qos routing
- wired networks
- identity based cryptography
- security services
- mobile nodes
- wireless sensor networks
- network infrastructure
- service differentiation