Review of MANETS Using Distributed Public-key Cryptography

Reading time: 2 minute
...

📝 Original Info

  • Title: Review of MANETS Using Distributed Public-key Cryptography
  • ArXiv ID: 1405.0100
  • Date: 2014-05-02
  • Authors: Researchers from original ArXiv paper

📝 Abstract

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment.

💡 Deep Analysis

Deep Dive into Review of MANETS Using Distributed Public-key Cryptography.

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment.

📄 Full Content

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment.

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut