Authentication in Ad Hoc Networks for Information Warfare
碩士 === 國防管理學院 === 國防資訊研究所 === 94 === Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each...
Main Authors: | WANG JHIH PENG, 王智鵬 |
---|---|
Other Authors: | 伍台國 |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/67960310304829071960 |
Similar Items
-
Trust-group-based authentication services for mobile ad hoc networks
by: Chih-Peng Chang, et al.
Published: (2005) -
Authentication with Open-ID on Vehicular Ad-Hoc Networks
by: Wei-chih Huang, et al.
Published: (2011) -
A Novel Authentication Protocol for Ad Hoc Networks
by: Chiu-Yi Lee, et al.
Published: (2005) -
Authentication Based on Multilayer Clustering in Ad Hoc Networks
by: Suh Heyi-Sook, et al.
Published: (2005-01-01) -
Authentication and Key Exchange in Mobile Ad Hoc Networks
by: Hoeper, Katrin
Published: (2007)