Non-repudiation in ad hoc networks

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tandel, P., Valiveti, S., Agrawal, K. P., & Kotecha, K. (2010). Non-repudiation in ad hoc networks. In Communications in Computer and Information Science (Vol. 120 CCIS, pp. 405–415). https://doi.org/10.1007/978-3-642-17604-3_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free