Author:
Zakhary Sameh,Benslimane Abderrahim
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference96 articles.
1. Achtzehn, A., et al., 2013. Survey of IEEE 802.11 Wi-Fi deployments for deriving the spatial structure of opportunistic networks. In: IEEE PIMRC.
2. Acquisti, A., Grossklags, J., 2005. Privacy and rationality in individual decision making, IEEE Security&Privacy, 2005.
3. Akkaya, K., Younis, M., 2005. A survey on routing protocols for wireless sensor networks, Ad Hoc Networks.
4. Albelaihy, A., Cazalas, J., 2017. A survey of the current trends of privacy techniques employed in protecting the location privacy of users in LBSs In: Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017.
5. Arafath, M.S., Khan, K.U.R., 2017. Opportunistic sensor networks: A survey on privacy and secure routing. In: IEEE ICACC, 2017.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献