Author:
Komninos Nikos,Vergados Dimitrios D.,Douligeris Christos
Subject
Law,General Computer Science
Reference17 articles.
1. An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc network;Boukerche;Computer Communications,2005
2. Untraceable electronic mail, return addresses, and digital pseudonyms;Chaum;Communications of the ACM,1981
3. Capkun S, Hubaux JP, Buttyan L. Mobility helps security in ad hoc networks. In: Proceedings of the ACM MobiHoc; 2003. p. 46–56.
4. Layered security design for mobile ad-hoc networks;Komninos;Computers & Security Journal,2006
5. Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proceedings of the nineth IEEE ICNP, Riverside, USA; 2001. p. 251–60.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献