Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
25
click to vote
ITCC
2005
IEEE
favorite
Email
discuss
report
110
views
Information Technology
»
more
ITCC 2005
»
Ad Hoc Key Management Infrastructure
14 years 3 months ago
Download
ntrg.cs.tcd.ie
Brian Lehane, Linda Doyle, Donal O'Mahony
Real-time Traffic
Information Technology
|
ITCC 2005
|
claim paper
Related Content
»
Overview the Key Management in Ad Hoc Networks
»
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
»
A secure group key management scheme for hierarchical mobile ad hoc networks
»
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
»
A Framework for Key Management in Mobile Ad Hoc Networks
»
Fully selforganized peertopeer key management for mobile ad hoc networks
»
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
»
Scalable Authenticated Tree Based Group Key Exchange for AdHoc Groups
»
Threshold cryptography in P2P and MANETs The case of access control
more »
Post Info
More Details (n/a)
Added
25 Jun 2010
Updated
25 Jun 2010
Type
Conference
Year
2005
Where
ITCC
Authors
Brian Lehane, Linda Doyle, Donal O'Mahony
Comments
(0)
Researcher Info
Information Technology Study Group
Computer Vision