Author:
Fatimah Afreen,Johari Rahul
Reference15 articles.
1. Choo, Fai Cheong, Mun Choon Chan, and Ee-Chien Chang. “Robustness of DTN against routing attacks.” Communication Systems and Networks (COMSNETS), 2010 Second International Conference on. IEEE, 2010.
2. Farrell, Stephen, and Vinny Cahill. “Security considerations in space and delay tolerant networks.” Space Mission Challenges for Information Technology, 2006. SMC-IT 2006. Second IEEE International Conference on. IEEE, 2006.
3. Ahuja, Sachin, Rahul Johari, and Chetna Khokhar. “EAST: exploitation of attacks and system threats in network.” In Information Systems Design and Intelligent Applications, pp. 601–611. Springer India, (2015).
4. Patra, Rabin, Sonesh Surana, and Sergiu Nedevschi. “Hierarchical identity based cryptography for end-to-end security in DTNs.”Intelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on. IEEE, 2008.
5. Punitha, K., et al. “A Secure I-Trust Scheme Towards Periodic Trust Establishment in Delay-Tolerant Networks.” (2015).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献