Author:
Xu Feng,Zhu Yuqi,Ma Hongxu,Cai Bin
Publisher
Computers, Materials and Continua (Tech Science Press)
Subject
Artificial Intelligence,Computational Theory and Mathematics,Theoretical Computer Science,Software
Reference7 articles.
1. B. Shanthini and S. Swamynathan, A Secure Authentication System Using Multimodal Biometrics for High Security MANETs, Advances in Computing and Information Technology, CCIS 198, Part 1. Berlin: Springer-Verlag, 2011, pp. 290–307.
2. H. Dey and R. Datta, A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network, Advances in Networks and Communications, CCIS 132, Part2. Berlin: Springer-Verlag, 2011, pp. 400–409.
3. O. Delgado-Mohatar, J. M. Sierra, and L. Brankovic, et al, An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks, Information Security Theory and Practices, LNCS 6033. Berlin: Springer-Verlag, 2010, pp. 332–339.
4. L. Venkatraman and D. P. Agrawal, A novel authentication scheme for ad hoc networks, Proceedings of Wireless Communications and Networking Conference, Chicago, USA: IEEE Press, 2000, pp. 1268–1273.
5. J. Yao, and G. H. Zeng, Key Agreement and Identity Authentication Protocols for Ad Hoc Networks, Proceedings of International Conference on Information Technology: Coding and Computing, Las Vegas, USA: IEEE Press, 2004.