Subject
Management of Technology and Innovation,Marketing,Computer Networks and Communications,Computer Science Applications
Reference37 articles.
1. A survey on clustering algorithms for wireless sensor networks;Abbasi;Computer Communications,2007
2. Provably secure on-demand source routing in mobile ad hoc networks;A´cs;IEEE Transactions on Mobile Computing,2006
3. A comparative study of the performance and security issues of AES and RSA cryptography;Al Hasib,2008
4. On the security of route discovery in MANETs;Burmester;IEEE Transactions on Mobile Computing,2009
5. Elements of Information Theory;Cover,2006
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mobile Commerce Technologies and Management;Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business;2021
2. Mobile Commerce Technologies and Management;Research Anthology on Securing Mobile Technologies and Applications;2021
3. Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks;Oriental journal of computer science and technology;2017-03-25
4. Mobile Commerce Technologies and Management;Mobile Platforms, Design, and Apps for Social Commerce;2017
5. JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET;Information Systems Security;2016