Author:
Bounouni Mahdi,Bouallouche-Medjkoune Louiza
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference26 articles.
1. Kobayashi K, Totani Y, Utsu K, Ishii H (2016) Achieving secure communication over MANET using secret sharing schemes. J Supercomput 72:1215–1225
2. Ramrekha TA, Panaousis E, Politis C (2013) Standardisation advancements in the area of routing for mobile ad-hoc networks. J Supercomput 64:409–434
3. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 255–265
4. Yau PW, Mitchell CJ (2003) Reputation methods for routing security for mobile ad hoc networks. In: Mobile future and symposium on trends in communications (SympoTIC’03), pp 130-137
5. Prathapani A, Santhanam L, Agrawal DP (2013) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomput 64:777–804
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献