Author:
Abdel-Halim Islam Tharwat,Fahmy Hossam Mahmoud Ahmed,Bahaa-Eldin Ayman Mohammad
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference30 articles.
1. Raju, J., & Garcia, J. J. (2000) A comparison of on-demand and table driven routing for ad-hoc wireless networks. In IEEE international conference on communications (ICC2000), pp. 1702–1706.
2. Stênico, J., & Ling, L. (2013). Topology Control for Ad-Hoc Networks: A comprehensive review for table driven and on-demand routing protocols. Communications and Network, 5(3), 239–246.
3. Alireza, A., et al. (2012) A survey of security challenges in cognitive radio networks: Solutions and future research directions. In Proceedings of the IEEE, (vol. 100, no. 12, pp. 3172–3186).
4. Hu, Y. C., & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28–39.
5. Hu, C., Johnson, D. B., & Perrig, A. (2002) SEAD: Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings 4th IEEE workshop on mobile computing systems and applications (WMCSA 02), IEEE Press, pp. 3–13.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献