[PDF][PDF] Secure light weight encryption protocol for MANET
B Rajkumar, G Narsimha - International Journal of Intelligent …, 2017 - researchgate.net
This paper proposes an incorporation mechanism of primitives to provide complete
cryptography services for Mobile Ad-Hoc Networks (MANETs). The proposed approach is …
cryptography services for Mobile Ad-Hoc Networks (MANETs). The proposed approach is …
RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks
M Anbarasan, S Prakash, A Antonidoss… - Multimedia Tools and …, 2020 - Springer
Abstract MANET (Mobile Adhoc Networks) possess the open system condition, absence of
central server, mobile nodes that make helpless to security assault while conventional …
central server, mobile nodes that make helpless to security assault while conventional …
A cross-layer key establishment scheme in wireless mesh networks
Cryptographic keys are necessary to secure communications among mesh clients in
wireless mesh networks. Traditional key establishment schemes are implemented at higher …
wireless mesh networks. Traditional key establishment schemes are implemented at higher …
[图书][B] Computer Security–ESORICS 2014
M Kutyłowski, J Vaidya - 2014 - Springer
These volumes contain the papers selected for presentation at the 19th European
Symposium on Research in Computer Security (ESORICS 2014), held during September 7 …
Symposium on Research in Computer Security (ESORICS 2014), held during September 7 …
[PDF][PDF] Cross-layer key establishment protocols for wireless devices
Y Zhang - 2017 - dro.deakin.edu.au
There are some problems in existing key establishment protocols. To alleviate these
problems, in our thesis, we designed a few cross-layer key establishment protocols by …
problems, in our thesis, we designed a few cross-layer key establishment protocols by …
A Robust and Energy Efficient Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
M Sarvabhatla, G Murugan… - 2014 3rd International …, 2014 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, there is an exponential
increase in usage of handheld devices to connect to remote servers. The advancement of …
increase in usage of handheld devices to connect to remote servers. The advancement of …
A versatile cryptographic toolkit for flexible access control
W Liu, X Liu, Q Wu, B Qin, Y Zhou - … Security Conference (CSC …, 2014 - ieeexplore.ieee.org
Many data driven networks have been developed so that data can be collected and shared
for bettering our life. Various cryptosystems are presented to address security and privacy …
for bettering our life. Various cryptosystems are presented to address security and privacy …