Author:
Faragallah Osama S.,El-Zoghdy S. F.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference43 articles.
1. Elaskily, M. A., Kelash, H. M., & Faragallah, O. S. (2012). An enhanced hierarchical key management scheme for MANETs. Wireless Personal Communication, 72, 1783–1800. doi: 10.1007/s11277-012-0910-1 .
2. Cheng, Y., Huang, C., & Shi, W. (2007). Trusted dynamic source routing protocol. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 1632–1636).
3. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000) Mitigating routing mis-behavior in mobile ad hoc networks. In Proceedings of 6th annual international conference on mobile computing and networking (pp. 255–265).
4. Buchegger, S., & Le Boudec, J. Y. (2002) Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTwork). In Proceedings of international IEEE conference on mobile ad hoc networking and computing.
5. Miranda, H., & Rodrigues, L. (2005). Preventing selfishness in open mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献