搜索结果: 1-10 共查到“军队指挥学 ad-hoc networks”相关记录10条 . 查询时间(0.234 秒)
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) Impersonation attack Bogus message attack
2019/5/13
Protecting a driver’s privacy is one of the major concerns in vehicular ad hoc networks (VANETs). Currently, Azees et al. has proposed an efficient anonymous authentication protocol (EAAP) for VANETs....
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
cryptographic protocols privacy requirements
2016/12/10
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy ve...
A secure anonymous communication scheme in vehicular ad hoc networks frompairings
Anonymous communication protocol bilinear pairings ID-based cryptosystem
2010/2/1
Security and efficiency are two crucial issues in vehicular ad hoc networks.
Many researches have devoted to these issues. However, we found that most of the
proposed protocols in this area are inse...
Cryptanalysis of Bohio et al.’s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
IBBSC Scheme Wireless Ad-hoc Networks
2009/6/5
Broadcast signcryption enables the broadcaster to simultaneously
encrypt and sign the content meant for a specific
set of users in a single logical step. It provides a very efficient
solution to th...
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Mobile ad hoc networks secure routing provable security
2009/3/27
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence,
an adversary can easily paralyze the operation of the network by attacking the routing protocol.
This has been...
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
Ad-hoc networks Universal verifiability Interoperability
2009/3/13
This paper addresses the problem of making signatures of one domain (an ad-hoc
network) available in another domain (the Internet). Universal verifiability is a highly
desirable property when signed...
Comments on “Distributed Symmetric Key Management for Mobile Ad hoc Networks” from INFOCOM 2004
Distributed Symmetric Key Management Mobile Ad hoc Networks INFOCOM
2009/1/12
In IEEE INFOCOM 2004, Chan proposed a distributed key
management scheme for mobile ad hoc networks, and deduced the condition
under which the key sets distributed to the network nodes can form a
co...
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Ad-hoc network Anonymity Routing
2008/12/19
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ...
Group Key Agreement for Ad Hoc Networks
μSTR μTGDH TFAN ad-hoc networks group key agreement
2008/10/17
Over the last 30 years the study of group key agreement has stimulated much work. And as a result of the
increased popularity of ad hoc networks, some approaches for the group key establishment in su...
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
the NTDR network system PKI cluster-based ad hoc network system
2008/8/28
In 1997, Ruppe R. et al [17] first proposed a Near-Term Digital Radio (NTDR)
network system which is a cluster-based ad hoc network intended to be used
efficiently for military missions. In the same...