Author:
Venkatesan Rajagopal,Srinivasan Balakrishnan,Rajendiran Periyasamy
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference27 articles.
1. Xia, H., Jia, Z., Sha, E.H.-M.: Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 8(2), 88–103 (2014)
2. Abdulwahid, H., Dai, B., Huang, B., Chen, Z.: Scheduled-links multicast routing protocol in MANETs. J. Netw. Comput. Appl., 63, 56–67 (2016)
3. Arthur, M.P., Kannan, K.: Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wirel. Netw. 22(3), 1035–1059 (2016)
4. Moamen, A.A., Hamza, H.S., Saroit, I.A.: Secure multicast routing protocols in mobile ad-hoc networks. Int. J. Commun Syst 27(11), 2808–2831 (2014)
5. Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J. (2015). https://doi.org/10.1155/2015/801632
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献