Author:
Abi-Char Pierre E.,Mhamed Abdallah,El-Hassan Bachar,Mokhtari Mounir
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Computer Engineering Series;A. Mhamed,2007
2. Lecture Notes in Computer Science;J.M. Covington,2006
3. Lecture Notes in Computer Science;L. Marc,2002
4. Corner, M.D., Noble, B.D.: Protecting Applications with Transient Authentication. In: Proceeding of the First International Conference on Mobile Systems, Applications and Services, pp. 57–70 (2003)
5. Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Proceeding of the Third International Symposium on Modeling and Optimization in Mobile Ad-hoc, and Wireless Networks, pp. 59–64 (2005)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献