To search, Click below search items.
All Published Papers Search Service
Title
Cryptoanalysis on Zhou et al.s¡¯ User Authentication Scheme
Author
Jue-Sam Chou, Xian-Wu Hou, Yalin Chen
Vol. 6 No. 8 pp. 112-115
Keywords
Energy-aware Distributed Cluster Minimization Algorithm for Intrusion Detection In Wireless Ad Hoc Networks
Juan Huan, Shiguang Ju, Xiaoming Han
Vol. 6 No. 8 pp. 106-111
ad hoc networks, intrusion detection, boundary node, critical node, energy-aware.
Private Channels in Wireless Local Networks
Maurizio Adriano Strangio
Vol. 6 No. 8 pp. 99-105
Wireless networks, Diffie-Hellman key exchange, Symmetric key authentication, Key agreement protocol
Scalable Hybrid Ad Hoc Routing Approach
Jose Costa-Requena, Tuna Vardar, Mohammad Ayyash, Raimo Kantola
Vol. 6 No. 8 pp. 82-98
Ad hoc networking, Hybrid Routing, Performance evaluation