Author:
Suseendran G.,Chandrasekaran E.,Nayyar Anand
Reference14 articles.
1. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40, 70–75.
2. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications, 11, 38–47.
3. Karpijoki, V. (2000, December). Security in ad hoc networks. In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland.
4. Andel, T. R., & Yasinsac, A. (2007). The invisible node attack revisited. Proceedings of IEEE SoutheastCon, 2007, 686–691.
5. Hu, Y., Perrig, A., & Johnson, D. (2002). Ariadne: A secure on-demand routing for ad hoc networks. In Proceedings of MobiCom 2002, Atlanta.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献