[PDF][PDF] Secure light weight encryption protocol for MANET

B Rajkumar, G Narsimha - International Journal of Intelligent …, 2017 - researchgate.net
This paper proposes an incorporation mechanism of primitives to provide complete
cryptography services for Mobile Ad-Hoc Networks (MANETs). The proposed approach is …

RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks

M Anbarasan, S Prakash, A Antonidoss… - Multimedia Tools and …, 2020 - Springer
Abstract MANET (Mobile Adhoc Networks) possess the open system condition, absence of
central server, mobile nodes that make helpless to security assault while conventional …

A cross-layer key establishment scheme in wireless mesh networks

Y Zhang, Y Xiang, X Huang, L Xu - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Cryptographic keys are necessary to secure communications among mesh clients in
wireless mesh networks. Traditional key establishment schemes are implemented at higher …

[图书][B] Computer Security–ESORICS 2014

M Kutyłowski, J Vaidya - 2014 - Springer
These volumes contain the papers selected for presentation at the 19th European
Symposium on Research in Computer Security (ESORICS 2014), held during September 7 …

[PDF][PDF] Cross-layer key establishment protocols for wireless devices

Y Zhang - 2017 - dro.deakin.edu.au
There are some problems in existing key establishment protocols. To alleviate these
problems, in our thesis, we designed a few cross-layer key establishment protocols by …

A Robust and Energy Efficient Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment

M Sarvabhatla, G Murugan… - 2014 3rd International …, 2014 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, there is an exponential
increase in usage of handheld devices to connect to remote servers. The advancement of …

A versatile cryptographic toolkit for flexible access control

W Liu, X Liu, Q Wu, B Qin, Y Zhou - … Security Conference (CSC …, 2014 - ieeexplore.ieee.org
Many data driven networks have been developed so that data can be collected and shared
for bettering our life. Various cryptosystems are presented to address security and privacy …