Back to Results
First PageMeta Content
Computing / Routing / Mobile ad hoc network / Wireless security / Wireless ad-hoc network / Peer-to-peer / Public-key cryptography / Scalable Source Routing / Wireless Routing Protocol / Wireless networking / Technology / Telecommunications engineering


Key Distribution in Mobile Ad Hoc Networks based on Message Relaying? Johann van der Merwe, Dawoud Dawoud, and Stephen McDonald University of KwaZulu-Natal, School of Electrical, Electronic and Computer Engineering, Sout
Add to Reading List

Document Date: 2013-06-28 06:18:16


Open Document

File Size: 209,32 KB

Share Result on Facebook

Company

activated sA / Armaments Corporation / Mobile Ad Hoc Networks / ARMSCOR / Case / Fig / /

Country

South Africa / /

/

Event

FDA Phase / /

Facility

Stephen McDonald University of KwaZulu-Natal / /

IndustryTerm

distributed network / online key distribution center / route form symbolic chain / on-demand routing protocols / large / stationary ad hoc networks / low mobility ad hoc network / energy resources / error-prone wireless channel / ad hoc networks / identity/network / security services / secure routing protocol / wireless network security / wireless nodes / potential network / pre-existing infrastructure / secure routing protocols / secure mutual authentication protocol / communication network / conventional wireline networks / wireless security / mutual authentication protocol / /

Organization

School of Electrical / Electronic and Computer Engineering / ON DN / Stephen McDonald University of KwaZulu-Natal / RN party / /

Person

Dawoud Dawoud / Stephen McDonald Qs CertRelay / Johann van der Merwe / Stephen McDonald / /

Position

system model / authenticated-links adversarial model / AM model / Private / random waypoint model / /

Product

UM / /

ProvinceOrState

Ontario / /

RadioStation

Qt AM / CBR / /

Technology

Stephen McDonald Qs CertRelay protocol / secure mutual authentication protocol / secure AM protocol / peer-to-peer / CertRelay protocol / private key / secure UM protocol / routing protocol / mutual authentication protocol / public key / underlying routing protocol / existing routing protocol / MANET protocols / secure routing protocol / secure routing protocols / on-demand routing protocols / simulation / digital signature / proposed protocol / /

SocialTag