首页> 美国政府科技报告 >Constraints and Approaches for Distributed Mobile AD-HOC Network Security
【24h】

Constraints and Approaches for Distributed Mobile AD-HOC Network Security

机译:分布式移动aD-HOC网络安全的约束和方法

获取原文

摘要

This document describes our SAFEMITS network constraints and key management approaches research for year 2. As a first step SUNYIT research team has researched mobile ad-hoc network technology and the unique communications environment in which it will be deployed. We have identified the requirements specific to our problem of providing key management for confidentially and group-level authentication. We have also identified constraints, particularly energy consumption that render this problem difficult.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号