Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...