Robust authenticated encryption scheme with multiple keys for ad hoc networks
Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiv...
Saved in:
Main Authors: | , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2019-07-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!