138
click to vote
ESAS
15 years 6 months ago
2005 Springer
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
120
click to vote
ESAS
15 years 6 months ago
2005 Springer
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
114
click to vote
ESAS
15 years 6 months ago
2005 Springer
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
109
Voted
ESAS
15 years 6 months ago
2005 Springer
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
|