Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack.
Sarosh HashmiJohn BrookePublished in: SECURWARE (2008)
Keyphrases
- malicious users
- authentication mechanism
- authentication protocol
- detection mechanism
- security mechanisms
- defense mechanisms
- security analysis
- authentication scheme
- data encryption
- key agreement
- countermeasures
- image authentication
- fragile watermarking
- computational models
- encryption decryption
- biometric authentication
- mechanism design