Author:
Annadurai P.,Vijayalakshmi S.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference23 articles.
1. Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks (1st ed.). Chichester, UK: Wiley.
2. Morgollan, M. (2008). Access authentication. In M. Morgollan (Ed.), Cryptography and security services: Mechanisms and applications (pp. 152–188). Hershey, PA: IGI Global. doi: 10.4018/978-1-59904-837-6.ch007
3. Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector (AODV) routing, in the second IEEE workshop on mobile computing systems and applications. LA: New Orleans.
4. Broch, J., Johnson, D. B., & Maltz, D. A. (1999). The dynamic source routing protocol for mobile ad hoc networks. IETF Internet Draft MANET Working Group.
5. Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequence-vector routing (DSDV) for mobil computers. Computer Communication Review, 24(4), 34–244.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献