Abstract

In this algorithm, we can choose different public key encryption algorithm, elliptic curve algorithm, different hash algorithm, such as MD5, SHA-1. Based on the public key management algorithm to Hash-chain mobile AD hoc network not only the solution to the problem of public key distribution management, also can be as a addible safety equipment connected in the current network terminal used in network environment is the need for security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call