Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
We propose protocols for a Public Key Infrastructre (PKI) suitable for ad hoc networks that are based on threshold cryptography technology, adapted to general ...
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols.
In ad-hoc networks, a basic routing infrastructure emerges through the collaboration of every node with its neighbors to forward packets towards chosen ...
People also ask
Apr 2, 2003 · We propose protocols for a Public Key Infrastructre (PKI) suitable for ad hoc networks that are based on threshold cryptography technology, ...
... public key infrastructure, which is the basis for most security protocols. We present a distributed algorithm for validating the association between the network ...
Missing: Supporting | Show results with:Supporting
Bibliographic details on Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.
The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end delivery of data packets, flow control, ...
We propose protocols for a Public Key Infrastructre (PKI) suitable for ad hoc networks that are based on threshold cryptography technology, adapted to general ...
Sep 13, 2021 · Public key infrastructure is the combination of software, encryption technologies, and services that enables enterprises to protect the security ...
Abstract—This paper studies public-key management, a fun- damental problem in providing security support for mobile ad hoc networks.