Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/2935
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTandel, Purvi-
dc.contributor.authorValiveti, Sharada-
dc.contributor.authorAgrawal, K. P.-
dc.contributor.authorKotecha, K.-
dc.date.accessioned2012-03-19T08:34:10Z-
dc.date.available2012-03-19T08:34:10Z-
dc.date.issued2010-12-13-
dc.identifier.citationCommunication and Networking, International Conference, FGCN 2010, Jeju Island, Korea, December 13-15, 2010, Page No. 405-415en_US
dc.identifier.urihttp://10.1.7.181:1900/jspui/123456789/2935-
dc.description.abstractWith the Phenomenal growth of the Internet and open networks in general, Security Services, Such as Non-repudiation, become Crucial to many applications. In Conventional networks Non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can’t use Trusted Third Party (TTP), There is a Scope to implement a non-repudiation protocol, which satisfies Non-repudiation requirements emerged by the application in a peer-to-peer network.en_US
dc.publisherSpringeren_US
dc.relation.ispartofseriesITFCE004-4en_US
dc.subjectNon-repudiationen_US
dc.subjectProof of Receptionen_US
dc.subjectSecure Data Aggregationen_US
dc.subjectWitness Selectionen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCE004en_US
dc.subjectITFCE006en_US
dc.subjectITDIR001en_US
dc.titleNon-repudiation in Ad Hoc Networksen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE004-4.pdfITFCE004-41.71 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.