![Computing / Routing / Mobile ad hoc network / Wireless security / Wireless ad-hoc network / Peer-to-peer / Public-key cryptography / Scalable Source Routing / Wireless Routing Protocol / Wireless networking / Technology / Telecommunications engineering Computing / Routing / Mobile ad hoc network / Wireless security / Wireless ad-hoc network / Peer-to-peer / Public-key cryptography / Scalable Source Routing / Wireless Routing Protocol / Wireless networking / Technology / Telecommunications engineering](https://www.pdfsearch.io/img/8174c82483d624b4b4a25af5d3480941.jpg)
| Document Date: 2013-06-28 06:18:16 Open Document File Size: 209,32 KBShare Result on Facebook
Company activated sA / Armaments Corporation / Mobile Ad Hoc Networks / ARMSCOR / Case / Fig / / Country South Africa / / / Event FDA Phase / / Facility Stephen McDonald University of KwaZulu-Natal / / IndustryTerm distributed network / online key distribution center / route form symbolic chain / on-demand routing protocols / large / stationary ad hoc networks / low mobility ad hoc network / energy resources / error-prone wireless channel / ad hoc networks / identity/network / security services / secure routing protocol / wireless network security / wireless nodes / potential network / pre-existing infrastructure / secure routing protocols / secure mutual authentication protocol / communication network / conventional wireline networks / wireless security / mutual authentication protocol / / Organization School of Electrical / Electronic and Computer Engineering / ON DN / Stephen McDonald University of KwaZulu-Natal / RN party / / Person Dawoud Dawoud / Stephen McDonald Qs CertRelay / Johann van der Merwe / Stephen McDonald / / Position system model / authenticated-links adversarial model / AM model / Private / random waypoint model / / Product UM / / ProvinceOrState Ontario / / RadioStation Qt AM / CBR / / Technology Stephen McDonald Qs CertRelay protocol / secure mutual authentication protocol / secure AM protocol / peer-to-peer / CertRelay protocol / private key / secure UM protocol / routing protocol / mutual authentication protocol / public key / underlying routing protocol / existing routing protocol / MANET protocols / secure routing protocol / secure routing protocols / on-demand routing protocols / simulation / digital signature / proposed protocol / /
SocialTag |