Author:
Kumari Ankita,Pranav Prashant,Dutta Sandip,Chakraborty Soubhik
Publisher
Springer International Publishing
Reference13 articles.
1. Jianmin C, Wu J (2005) A survey on cryptography applied to secure mobile ad-hoc networks and wireless sensor networks. In: Proceedings of CRYPTO, pp 27–56
2. Sharma A, Bhuriya D, Singh U (2015) Secure data transmission on MANET by hybrid cryptography technique. In 2015 International conference on computer, communication, and control (IC4), pp 1–6
3. Leu S, Chang RS (2012) A weight-value algorithm for finding connected dominating sets in a MANET. J Netw Comput Appl 35(5):1615–1619
4. Sun B, Pi S, Gui C, Zeng Y, Yan B, Wang W, Qin Q (2008) Multiple constraints QoS multicast routing optimization algorithm in MANET based on GA. Prog Nat Sci 18(3):331–336
5. Arora SK, Monga H (2016) Performance evaluation of MANET based on knowledge base algorithm. Optik 127(18):7283–7291
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献