Back to Results
First PageMeta Content
Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography


Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance
Add to Reading List

Document Date: 2006-01-24 03:14:56


Open Document

File Size: 114,50 KB

Share Result on Facebook

City

Pathumthani / Kanagawa-ken / /

Company

Fiat / Systems Development Laboratory / BP / Linus Torvalds / Intel Corporation / Securing Ad Hoc Networks / Keio / Sun Microsystems Inc. / Fujisawa / SIAM Journal / Mobile Ad-Hoc Networks / RSA Security Inc. / Microsoft Corporation / Red Hat Inc. / Hitachi Ltd. / /

Country

Thailand / France / Japan / United States / /

Event

FDA Phase / /

Facility

Yasuko Fukuzawa§ University / Asian Institute of Technology / /

IndustryTerm

multiparty authentication services / ubiquitous wireless networking / chosen algorithm / secure / dedicated wireless network / ad-hoc networks / wireless link / possible solutions / above algorithm / mobile networking platforms / well-suited algorithms / interactive proof systems / hop wireless link / pre-existing fixed network infrastructure / cellular telephony / member authentication protocol / authentication protocols / ad-hoc network / /

OperatingSystem

XP / Linux / Fedora / Microsoft Windows / /

Organization

Certified Authority / New / Graduate School / Yasuko Fukuzawa§ University / Asian Institute of Technology / /

Person

Sophia Antipolis / Mohammad Hossein Manshaei / /

Position

driver / dealer / /

Product

Microsoft Corporation Portable Audio Device / Windows / Linux / Pentium / B2 / Java3 / /

ProgrammingLanguage

Java / /

PublishedMedium

SIAM Journal on Computing / Communications of the ACM / Theory of Computing / Lecture Notes in Computer Science / /

Technology

above algorithm / IPv6 / Hash Algorithm / Linux / ESULTS Our protocol / The protocol / secret key / Key Agreement protocols / encryption / cryptography / public key / chosen algorithm / Java / authentication protocols / knowledge-based protocol / member authentication protocol / A. Zero Knowledge Proof The protocol / ZKP algorithm / ISP / message encryption / IPv4 / well-suited algorithms / Share Encryption Our protocol / /

SocialTag