Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference35 articles.
1. Qaisar MUF, Wang X, Hawbani A, Khan A, Ahmed A, Wedaj FT (2020) “Torp: load balanced reliable opportunistic routing for asynchronous wireless sensor networks,” In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 1384–1389
2. Farooq MU, Wang X, Sajjad M, Qaisar S (2018) Development of protective scheme against collaborative black hole attacks in mobile ad hoc networks. KSII Trans Intern Info Sys (TIIS) 12(3):1330–1347
3. Yadav VK, Anand A, Verma S, Venkatesan S (2020) Private computation of the schulze voting method over the cloud. Clust Comput 23(4):2517–2531
4. Wang Q, Lin D, Yang P, Zhang Z (2019) An energy-efficient compressive sensing-based clustering routing protocol for wsns. IEEE Sens J 19(10):3950–3960
5. Lin D, Wang Q (2017) A game theory based energy efficient clustering routing protocol for wsns. Wirel Netw 23(4):1101–1111
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献