Filters








13 Hits in 7.6 sec

An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol

Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
<span title="">2004</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vzuoj3pepvcxxigkgo3mjm6ckm" style="color: black;">Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN &#39;04</a> </i> &nbsp;
The URSA protocol relies on the new proactive RSA signature scheme, which allows members in an ad hoc group to make access control decisions in a distributed manner.  ...  Recently, Luo, et al. in a series of papers [17, 14, 13, 18, 15] proposed a set of protocols for providing ubiquitous and robust access control [URSA] in mobile ad hoc networks without relying on a centralized  ...  THE PROACTIVE RSA SIGNATURE SCHEME IN URSA In this section we describe the proactive RSA signature scheme of [17, 14, 13, 18, 15] used in the URSA ad hoc network access control protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029102.1029105">doi:10.1145/1029102.1029105</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sasn/JareckiSY04.html">dblp:conf/sasn/JareckiSY04</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sauilwslizgv7caiaf4praljsu">fatcat:sauilwslizgv7caiaf4praljsu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810103657/http://www.ics.uci.edu/~stasio/Papers/jsy04.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c5/bd/c5bd8b07a124bcc57b0356620fa85578ba796aea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1029102.1029105"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol

Stanisław Jarecki, Nitesh Saxena
<span title="">2010</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xqa4uhvxwvgsbdpllabnuanz6e" style="color: black;">IEEE Transactions on Information Forensics and Security</a> </i> &nbsp;
The URSA protocol relies on the new proactive RSA signature scheme, which allows members in an ad hoc group to make access control decisions in a distributed manner.  ...  Luo, et al. proposed a set of protocols for providing ubiquitous and robust access control (called URSA 1 ) in mobile ad hoc networks without relying on a centralized authority.  ...  Proactive RSA Scheme Proposed for the URSA Ad Hoc Network Access Control Protocol. In an effort to mitigate the above problem of the known proactive RSA signatures, Luo, et al.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2010.2058104">doi:10.1109/tifs.2010.2058104</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4qa52da3qbgupigimk4ymajxtm">fatcat:4qa52da3qbgupigimk4ymajxtm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130108010242/http://www.cis.uab.edu/saxena/docs/js-tifs10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/51/16/511647dd6fd6dbc802e8dd30539fe9e267571dca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2010.2058104"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks

H. Luo, J. Kong, P. Zerfos, S. Lu, L. Zhang
<span title="">2004</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wn5qtqh7ejhpfdjtrxhija73bq" style="color: black;">IEEE/ACM Transactions on Networking</a> </i> &nbsp;
ACKNOWLEDGMENT The authors greatly appreciate all the constructive comments by Dr. K. Nahrstedt and the reviewers.  ...  Access control in an ad hoc environment is a distributed problem by its nature.  ...  In this paper, we present URSA, a novel solution to ubiquitous and robust access control in mobile ad hoc networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnet.2004.838598">doi:10.1109/tnet.2004.838598</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/acxfvrc75vh27kjzaglwm2ix4a">fatcat:acxfvrc75vh27kjzaglwm2ix4a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170817102035/http://escholarship.org/uc/item/4g51q6j0.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e6/50/e650ca5ef08deda821578ab51c0717f596fb069b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnet.2004.838598"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Threshold cryptography in P2P and MANETs: The case of access control

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
<span title="">2007</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/blfmvfslmbggxhopuigjdb3jma" style="color: black;">Computer Networks</a> </i> &nbsp;
Decentralized access control is the fundamental security service for ad hoc groups.  ...  In this paper, we construct several distributed access control mechanisms for ad hoc groups.  ...  However, known provably secure threshold RSA signatures do not yield access control mechanisms for ad hoc groups.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2007.03.001">doi:10.1016/j.comnet.2007.03.001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fxrfhfrmbndannbemz5ju24u2e">fatcat:fxrfhfrmbndannbemz5ju24u2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813154543/https://info.cs.uab.edu/saxena/docs/sty07.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/76/b2/76b2e52876ef823612a892958d74ac0cd229f2d5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2007.03.001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

A survey of survivability in mobile ad hoc networks

Michele Lima, Aldri dos Santos, Guy Pujolle
<span title="">2009</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
Considerable improvements have been made towards providing ad hoc network security. However, conventional lines of defense are inefficient to put all attacks and intrusions off.  ...  Survivability is defined as the network ability to fulfill correctly its functions even in the presence of attacks or intrusions.  ...  Each node participating in the ad hoc network contains an access control list, where authorized flows are defined.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/surv.2009.090106">doi:10.1109/surv.2009.090106</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/za35x67i5rfh5koo5gmaljyyn4">fatcat:za35x67i5rfh5koo5gmaljyyn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120402132509/http://www.lip6.fr/lip6/reports/2007/lip6-2007-001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/6d/336d581f739261e141cdebebfa3cf92d2c4877c5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/surv.2009.090106"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Key Management Schemes in MANET: A Review

Taranpreet Kaur
<span title="2018-01-31">2018</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
ad hoc networks.  ...  are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment .This paper, present the study on various kinds of key management schemes with their  ...  Ubiquitous and Robust Access Control (URSA) URSA is a localized key management scheme proposed by Luo, Kong, and Zerfos in their paper "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.1258">doi:10.22214/ijraset.2018.1258</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t3pgxe7eibb73e5ha5in7wh4wa">fatcat:t3pgxe7eibb73e5ha5in7wh4wa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211014820/http://ijraset.com/fileserve.php?FID=12288" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/5f/bf5f9c2e6cd66e32f520660082de6ac467d71c66.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2018.1258"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security in mobile ad hoc networks: challenges and solutions

Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang
<span title="">2004</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kg4jy3hqtrbk7opmhgzlagufnu" style="color: black;">IEEE wireless communications</a> </i> &nbsp;
In this article we focus on the fundamental security problem of protecting the multihop network connectivity between mobile nodes in a MANET.  ...  Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless  ...  SECURE AD HOC ROUTING The secure ad hoc routing protocols take the proactive approach and enhance the existing ad hoc routing protocols, such as DSR and AODV, with security extensions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mwc.2004.1269716">doi:10.1109/mwc.2004.1269716</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5xfmyzqpszfenls6o2cuvlmgyi">fatcat:5xfmyzqpszfenls6o2cuvlmgyi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810084344/http://www.ece.sunysb.edu/~fanye/papers/wireless04-sec.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/02/be0237f400c30efb81605fcbb182106269ac5972.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mwc.2004.1269716"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Defense Mechanisms in Mobile Ad-hoc Networks

Ola H., Salah E., Ayman El-Sayed
<span title="2017-05-25">2017</span> <i title="Foundation of Computer Science"> Communications on Applied Electronics </i> &nbsp;
that recognize mobile ad hoc networks from the regular ones.  ...  One of the most important issues for mobile ad-hoc Networks (MANETs) is Security.  ...  Ubiquitous and Robust Access Control (URSA): URSA is effective and furnishes dependable accessibility with having the countenance of encoded local communication.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae2017652601">doi:10.5120/cae2017652601</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ot2s5s2ownfinmkdnjbhhrwgie">fatcat:ot2s5s2ownfinmkdnjbhhrwgie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604011607/https://www.caeaccess.org/archives/volume7/number2/younis-2017-cae-652601.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/4a/724a6f1dd74ef8631ec32aa193ed734c34870a31.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/cae2017652601"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okrr6mjegfbtbjrfrxtci54s6i" style="color: black;">IEEE Transactions on Dependable and Secure Computing</a> </i> &nbsp;
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs).  ...  Index Terms-Mobile ad hoc networks, security, key management, ID-based cryptography, secret sharing Y. Zhang is with the  ...  The closest work to ours is ID-GAC [12] , in which Saxena et al. present an elegant IBC-based access control scheme for ad hoc groups such as MANETs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2006.58">doi:10.1109/tdsc.2006.58</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4x6mp46i5nfalopsyuhkax4uoi">fatcat:4x6mp46i5nfalopsyuhkax4uoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080418220037/http://web.njit.edu/~yczhang/files/tdsc-full.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/bf/41bf3ed40a112fa7765ed20e48c32921b0dc9cae.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2006.58"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Securing a Wireless World

Hao Yang, F. Ricciato, Songwu Lu, Lixia Zhang
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
mobile ad hoc networks.  ...  In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and  ...  The implementation is specific to the ad hoc routing protocol in use. • Data plane attacks: Regardless of which routing protocol is in use, an attacker can drop the data packets passing through it, replay  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862321">doi:10.1109/jproc.2005.862321</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vgfacpwckngavp6df2d4642lei">fatcat:vgfacpwckngavp6df2d4642lei</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170506124205/http://web.cs.ucla.edu:80/~lixia/papers/06IEEEProc.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/c2/55c2fbaf7b2831ca27ab819c078a505c5f8b0d2e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2005.862321"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey of Key Management in Mobile Ad Hoc Networks [chapter]

Bing Wu, Jie Wu, Mihaela Cardei
<i title="IGI Global"> Handbook of Research on Wireless Security </i> &nbsp;
Security has become a primary concern in mobile ad hoc networks (MANETs).  ...  A number of key management schemes have been proposed for the MANETs. In this article, we present a survey of the research work on the key management in MANETs according to recent literature.  ...  Ubiquitous and Robust Access Control (URSA) URSA is a localized key management scheme proposed by Luo, Kong, and Zerfos [6] [44] in their paper "URSA: Ubiquitous and Robust Access Control for Mobile  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/978-1-59904-899-4.ch030">doi:10.4018/978-1-59904-899-4.ch030</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ho5lfari5aspa54nkfvaumrvy">fatcat:2ho5lfari5aspa54nkfvaumrvy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070824150134/http://www.cse.fau.edu/~jie/research/publications/Publication_files/groupKey_bookChapterv2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/f9/88f93fee10de7b9ee8b8c75f4308d2ca15e4c38e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/978-1-59904-899-4.ch030"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A HYBRID SCHEMA ZONE-BASED KEY MANAGEMENT FOR MANETS

Thair Khdour, Abdullah Aref
<span title="">2012</span> <i > Journal of Theoretical and Applied Information Technology </i> &nbsp; <span class="release-stage">unpublished</span>
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention Securing communications in resource constrained  ...  , infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) is very challenging.  ...  b) Ubiquitous and Robust Access Control (URSA) The URSA protocol uses a (k, n) threshold scheme to distribute an RSA certificate signing key to all nodes in the network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aizo6fl45fbgjfti574ln2ovx4">fatcat:aizo6fl45fbgjfti574ln2ovx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180413051255/http://www.jatit.org/volumes/Vol35No2/7Vol35No2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/f7/edf7728570fc1b1f7ac01fb1047b7afe5f15dfda.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Toward Authentication Mechanisms for Wi-Fi Mesh Networks

Mohammad Saay
<span title="">2011</span> <span class="release-stage">unpublished</span>
This method is a URSA which is a user access mechanism based on the network layer, is fully localized to provide ubiquitous and robust access control for mobile ad-hoc networks.  ...  BATMAN, which like OLSR, is a proactive routing protocol for establishing multi-hop routes in mobile ad-hoc networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/emes77cqn5bbhh7c6k23noc4qq">fatcat:emes77cqn5bbhh7c6k23noc4qq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180514100705/http://etd.uwc.ac.za/xmlui/bitstream/handle/11394/5275/Saay_ms_msc_ns_2011.pdf;jsessionid=4F956B8C154AE43095FE0710F47371C5?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/38/9838ea3c647aaabebd6fbf6810a464dbba5bbfcf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>