Author:
Narayana G.,Akkalakshmi M.,Damodaram A.
Reference8 articles.
1. Maria Striki, John S. Baras and Kyriakos Manousakis, “A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET”, IEEE, International Conference on Communication, PP: 2249–2255, 2006.
2. Xixiang Lv and Hui Li, “Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks”, IET Information Security, ISSN:1751-8709, 2010.
3. Mohamed Younis, Osama Farrag and Bryan Althouse, “TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks”, IEEE Transactions on Network and Service Management, Vol. 9, No. 1, MARCH 2012.
4. Zhiguo Wan, Kui Ren, and Ming Gu, “USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks”, IEEE Transactions on Wireless Communications, 2012.
5. Hua-Yi Lin and Tzu-Chiang Chiang, “Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks”, EURASIP Journal on Wireless Communications and Networking, PP: 1–15, 2011.