Secret instantiation in ad-hoc networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret instantiation in ad-hoc networks

In this paper, we focus our attention on the problem of assigning initial secrets to users in ad-hoc network (respectively, sensors in a sensor network) so that they can use those secrets to ensure authentication and privacy during their communication. The goal of this assignment is to ensure that any two users can communicate securely with each other even though each user maintains only a smal...

متن کامل

Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215]

M. Gouda holds the Mike A. Myers Centennial Professorship in Computer Sciences at the University of Texas at Austin. His research areas are distributed and concurrent computing and network protocols. He has a Ph.D. in Computer Science from the University of Waterloo. Contact The publisher regrets that in the original printing of the above article, the author biographies and photographs were not...

متن کامل

Assessment of DSACC and QPART Algorithms in Ad Hoc Networks

The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...

متن کامل

Hierarchial Secret Sharing in Ad Hoc Networks through Birkhoff Interpolation

Securing ad hoc networks represents a challenging issue, related to their very characteristics of decentralized architecture, low-complexity, and multiple hops communications. Even if several methods are available, this paper presents a novel approach to allow secret sharing of information at lower levels of the node protocol stack. In fact, secret sharing schemes provide a natural way of addre...

متن کامل

Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks P.V. Siva Kumar Department of Computer Science and Engineering, VNR VJIET, Hyderabad, India Email: [email protected] Dr. Rajasekhara Rao Kurra Sri Prakash College of Engineering, Tuni, India, email: [email protected]. in Appala Naidu Tentu and G.Padmavathi CRRao AIMSCS, University of Hyderabad Ca mp us , Hyderabad , I nd ia ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communications

سال: 2006

ISSN: 0140-3664

DOI: 10.1016/j.comcom.2005.05.017