Author:
Nawej Claude Mukatshung,Owolawi Pius Adewale,Walingo Tom
Reference21 articles.
1. Ranjitha P (2014) Securable message authentication system in vehicular ad-hoc networks by using trusted authority. Int J Emerg Technol Comput Sci Electron IJETCSE 8(1):330–337
2. Association for Safe International Road Travel, https://www.asirt.org/safe-travel/road-safety-facts, last accessed 2020/08/27.
3. Lee F (2011) Routing in mobile ad-hoc networks, mobile ad-hoc networks: protocol design. Prof. XinWang (edn). InTech, Shanghai
4. Young PL, Tian C, Yu Y (2005) Analysis on optimizing model for proactive ad hoc routing protocol, MILCOM. In: 2005 IEEE military communications conference, vol. 5, pp 2960–2966. IEEE, Atlantic City, NJ. https://doi.org/10.1109/MILCOM.2005.1606113
5. Ram Murthy CS, Manoj BS (2004) Ad Hoc wireless networks architectures and protocols. Prentice Hall, New Jersey
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献