On the Distribution of Revocation Information in Ad Hoc Networks
Abstract
Index Terms
- On the Distribution of Revocation Information in Ad Hoc Networks
Recommendations
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing ...
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication ...
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
Recently, Identity-Based Cryptography (IBC) schemes have been considered as a tool to secure Mobile Ad Hoc Networks (MANETs) due to the efficient key management of the schemes. In this work, we focus on the role of the Key Generation Centre (KGC) as a ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
IEEE Computer Society
United States
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0