Sciweavers

7 search results - page 2 / 2
» BAP: Broadcast Authentication Using Cryptographic Puzzles
Sort
View
100
Voted
ICCCN
2007
IEEE
15 years 6 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
110
Voted
CCS
2008
ACM
15 years 2 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig