104
click to vote
ESAS
15 years 2 months ago
2005 Springer
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
ESAS
15 years 2 months ago
2005 Springer ESAS
15 years 2 months ago
2005 Springer
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
ESAS
15 years 2 months ago
2005 Springer
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
ESAS
15 years 2 months ago
2005 Springer
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
|