Verma et al., 2004 - Google Patents
Progressive authentication in ad hoc networksVerma et al., 2004
View PDF- Document ID
- 10854208450731236677
- Author
- Verma R
- O’Mahony D
- Tewari H
- Publication year
- Publication venue
- Proceedings of the Fifth European Wireless Conference
External Links
Snippet
In this paper we address the problem of trust formation and secure communications in ad- hoc networks. The dynamic nature and frequent membership changes make it difficult to form trust relationships in ad hoc networks. We intend to build such relationships by …
- 230000000750 progressive 0 title abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | Ubiquitous and robust authentication services for ad hoc wireless networks | |
Weimerskirch et al. | A distributed light-weight authentication model for ad-hoc networks | |
Obi | Security issues in mobile ad-hoc networks: a survey | |
Pirzada et al. | Kerberos assisted authentication in mobile ad-hoc networks | |
Cho et al. | Trust threshold based public key management in mobile ad hoc networks | |
Varadharajan et al. | Security for cluster based ad hoc networks | |
Aboudagga et al. | Authentication protocols for ad hoc networks: taxonomy and research issues | |
Aura et al. | Towards a survivable security architecture for ad-hoc networks | |
Renugadevi et al. | Key management schemes for secure group communication in wireless networks-a survey | |
Yang et al. | Design of Key Management Protocols for Internet of Things. | |
Palomar et al. | Secure content access and replication in pure p2p networks | |
Poltronieri et al. | A secure group communication approach for tactical network environments | |
del Valle et al. | Overview the key management in ad hoc networks | |
Tang et al. | Strong authentication for tactical mobile ad hoc networks | |
Verma et al. | Ntm-progressive trust negotiation in ad hoc networks | |
Lu et al. | Distributed ledger technology based architecture for decentralized device-to-device communication network | |
Verma et al. | Progressive authentication in ad hoc networks | |
Dawoud et al. | Trust establishment in mobile ad hoc networks: Key management | |
Boukerche et al. | The design of a secure key management system for mobile ad hoc networks | |
CN110933674A (en) | SDN controller and Ad Hoc node based security channel self-configuration method | |
Ghalwash et al. | Self adjusted security architecture for mobile ad hoc networks (MANETs) | |
Benamar et al. | A new management scheme of cluster based PKI for ad hoc networks using multi-signature | |
Martucci et al. | A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks | |
da Silva et al. | SEMAN: A novel secure middleware for mobile ad hoc networks | |
Striki et al. | Towards integrating key distribution with entity authentication for efficient, scalable and secure group communication in MANETs |