Author:
Ahmed Adnan,Abu Bakar Kamalrulnizam,Channa Muhammad Ibrahim,Haseeb Khalid,Khan Abdul Waheed
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference39 articles.
1. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192. doi: 10.1016/S1570-8705(03)00019-2 .
2. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38. doi: 10.1007/s11276-004-4744-y .
3. Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi: 10.1002/ett.2635 .
4. Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.
5. Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献