Author:
Bhati Bhawani Shanker,Venkataram Pallapa
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture
Reference34 articles.
1. J. Hoebeke, I. Moerman, B. Dhoedt and P. Demeester, An overview of mobile ad hoc networks: applications and challenges, Journal of the Communications Network, Vol. 3, pp. 60–66, 2004.
2. X. Hong, J. Kong, and M. Gerla. A new set of passive routing attacks in mobile ad hoc networks. pages 796–801, 2003.
3. H. Choi, P. McDaniel, and T. F. La Porta. Privacy preserving communication in manets. In 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 233–242, 2007.
4. Y. Yang, M. Shao, S. Zhu and G. Cao, Towards statistically strong source anonymity for sensor networks, ACM Transactions on Sensor Networks (TOSN), Vol. 9, No. 3, pp. 1–23, 2013.
5. A. A. Bakar, A. A. Ghapar, and R. Ismail. Access control and privacy in manet emergency environment. In Computer and Information Sciences (ICCOINS), 2014 International Conference on, pages 1–6, 2014.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献