Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks.
Gergely ÁcsLevente ButtyánIstván VajdaPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- provably secure
- qos routing
- key management
- ad hoc networks
- mobile ad hoc networks
- routing algorithm
- standard model
- security model
- blind signature
- signature scheme
- public key
- blind signature scheme
- wireless ad hoc networks
- routing problem
- mobile nodes
- hash functions
- wireless sensor networks
- network topology
- routing protocol
- diffie hellman
- quality of service
- end to end
- shortest path
- secret sharing scheme
- cloud computing
- high dimensional
- threshold signature scheme
- partially blind signature scheme