Author:
Cai Fu,Fan Hong,Rui-xian Li,Liang Hong,Jing Chen
Publisher
Springer Science and Business Media LLC
Reference8 articles.
1. Zhou L, Haas Z. Securing Ad Hoc Networks.IEEE Network, 1999,13(6): 24–30.
2. Kong J, Zerfos P, Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, CA. 2001.
3. Douceur J. The Sybil Attack.Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA. 2002.
4. Capkun S, Buttyan L. Mobile Computing.IEEE Transactions, 2003,2(1): 52–64.
5. McKenney P, Bausbacher P. Physical and Link Layer Modeling of Packet Radio Network Performance.IEEE Journal on Selected Areas in Communication, 1991,9(1): 59–64.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献