1. Anjali, Shikha, M. Sharma, Wireless sensor networks: routing protocols and security issues, in Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (2014), pp. 1–5.
https://doi.org/10.1109/ICCCNT.2014.6962992
2. S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A. Woodward, A distance routing effect algorithm for mobility (dream), in Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM, New York, 1998), pp. 76–84
3. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, Present: an ultra-lightweight block cipher, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2007), pp. 450–466
4. T. Camp, J. Boleng, L. Wilcox, Location information services in mobile ad hoc networks, in IEEE International Conference on Communications, 2002. ICC 2002, vol. 5 (IEEE, Piscataway, 2002), pp. 3318–3324
5. C.Y. Chow, M.F. Mokbel, X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM, New York, 2006), pp. 171–178