Efficient identity-based security scheme
β
Muhammad Bohio; Ali Miri
π
Article
π
2004
π
Elsevier Science
π
English
β 286 KB
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that