{"title":"基于qos的自组织无线网络认证方案","authors":"P. Muppala, Johnson P. Thomas, A. Abraham","doi":"10.1109/ITCC.2005.235","DOIUrl":null,"url":null,"abstract":"In this paper we investigate the selection of an optimal threshold level that takes into account security and quality of service requirements for ad hoc networks. We incorporate intelligence into the selection of an optimal threshold for a distributed threshold cryptography scheme for a distributed trust model in ad hoc networks. We investigate both local and global threshold schemes.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"460 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"QoS-based authentication scheme for ad hoc wireless networks\",\"authors\":\"P. Muppala, Johnson P. Thomas, A. Abraham\",\"doi\":\"10.1109/ITCC.2005.235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we investigate the selection of an optimal threshold level that takes into account security and quality of service requirements for ad hoc networks. We incorporate intelligence into the selection of an optimal threshold for a distributed threshold cryptography scheme for a distributed trust model in ad hoc networks. We investigate both local and global threshold schemes.\",\"PeriodicalId\":326887,\"journal\":{\"name\":\"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II\",\"volume\":\"460 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-04-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCC.2005.235\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCC.2005.235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
QoS-based authentication scheme for ad hoc wireless networks
In this paper we investigate the selection of an optimal threshold level that takes into account security and quality of service requirements for ad hoc networks. We incorporate intelligence into the selection of an optimal threshold for a distributed threshold cryptography scheme for a distributed trust model in ad hoc networks. We investigate both local and global threshold schemes.