Author:
Borkar Gautam M.,Mahajan A. R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference31 articles.
1. Corson, M. S., Macker, P. J., & Cirincione, G. H. (1999). Internet-based mobile ad hoc networking. Internet Computing, IEEE, 3(4), 63–70.
2. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.
3. Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.
4. Azedine, B., El-Khatiba, K., Xua, L., & Korbab, L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.
5. Li, Wenjia, & Joshi, Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland.
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献