Security in MANET's by Using Detective Signature Techniques.
Gayathri A.P. NarayanasamyPublished in: J. Comput. Sci. (2015)
Keyphrases
- digital copyright protection
- routing protocol
- access control
- information security
- intrusion detection
- mobile ad hoc networks
- private key
- network security
- security policies
- statistical databases
- information systems
- ad hoc networks
- fully distributed
- security issues
- signature recognition
- key management
- blind signature scheme
- signature scheme
- security model
- signature verification
- security analysis
- security requirements
- energy efficient
- peer to peer