Login / Signup
Reliable and secure communication over adversarial multipath networks: A survey.
Swanand Kadhe
Alex Sprintson
Qiaosheng Eric Zhang
Mayank Bakshi
Sidharth Jaggi
Published in:
ICICS (2015)
Keyphrases
</>
multipath
secure communication
wireless ad hoc networks
routing algorithm
end to end
ad hoc networks
multiple paths
smart card
secret key
key management
resource constrained
digital signature
secret sharing
network resources
response time
public key
network structure
security protocols
network security