Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks

Faculty Computer Science Year: 2015
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Conference on Security and Cryptography SECRYPT 2009 - Italy Institute for Systems and Technologies of Information, Control and Communication Volume:
Keywords : Ad-hoc , Demand Authentication Chain Protocol , , Authentication    
Abstract:
A mobile ad hoc network is an autonomous system that is made up of collaborative mobile nodes. Nodes in mobile ad hoc networks have limited capabilities and dynamic topology. Authentication of network nodes and the establishment of secret
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Elsevier, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags", National Chung Hsing University, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More

Department Related Publications

  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More
  • Ehab Roshdy Mohamed, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", crossmark, 2018 More
  • Khalied Mohamed Hosny, "New set of multi-channel orthogonal moments for color image representation and recognition", ُElsevier, 2019 More
  • Khalied Mohamed Hosny, "Skin Lesions Classification into Eight Classes for ISIC 2019 Using Deep Convolutional Neural Network and Transfer learning", ieee, 2020 More
  • Ahmed Mahmoud Mahmoud Dawood, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
Tweet