Author:
Suresh Babu E.,Nagaraju C.,Krishna Prasad M. H. M.
Reference12 articles.
1. Dasgupta, M. (2012). Network modelling of a blackhole prevention mechanism in mobile ad-hoc network. In Fourth International Conference on Computational Intelligence and Communication Networks.
2. Woungang, I. (2012). Detecting blackhole attacks on DSR-based mobile ad hoc networks. IEEE International Conference on Computer, Information and Telecommunication Systems (CITS).
3. Lu, S., Li, L., Lam, K.-Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of International. Conference on Computational Intelligence and Security, December 11–14, Beijing, China (pp. 421–425).
4. Perkins, C. E., & Royer, E. M. (2001). The ad hoc on-demand distance-vector protocol. In C. E. Perkins (Ed.), Ad Hoc Networking (Chap. 6, pp. 173–220). Reading, MA: Addison-Wesley.
5. Ning, K. (2009). A pseudo DNA cryptography method CoRR 2009, abs/0903.2693.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献