ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks
Lecture Notes in Computer Science - Computational Science and Its Applications – ICCSA 2007
◽
10.1007/978-3-540-74477-1_13
◽
2007
◽
pp. 131-139
◽
Cited By ~ 1
Author(s):
Do-hyeon Lee
◽
Sun Choi
◽
Ji-hyeon Choi
◽
Jae-il Jung
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Routing Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
ETSR: Enhanced Trust Based Secure Routing Scheme for Mobile Ad Hoc Networks
Journal of Computational and Theoretical Nanoscience
◽
10.1166/jctn.2019.7883
◽
2019
◽
Vol 16
(5)
◽
pp. 2265-2272
Author(s):
Vaishali Vilas Sarbhukan
◽
Lata Ragha
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Routing Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks
2010 IEEE Asia-Pacific Services Computing Conference
◽
10.1109/apscc.2010.16
◽
2010
◽
Cited By ~ 4
Author(s):
Lanjun Dang
◽
Jie Xu
◽
Hui Li
◽
Nan Dang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Privacy based Web Services Application for Secure Routing in Mobile Ad Hoc Networks
International Journal of Information Technology Convergence and Services
◽
10.5121/ijitcs.2012.2206
◽
2012
◽
Vol 2
(2)
◽
pp. 55-59
Author(s):
Sesha Bhargavi Velagaleti
Keyword(s):
Web Services
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks
Advanced Sciences and Technologies for Security Applications - Combating Security Challenges in the Age of Big Data
◽
10.1007/978-3-030-35642-2_5
◽
2020
◽
pp. 87-104
Author(s):
Uttam Ghosh
◽
Pushpita Chatterjee
◽
Al-Sakib Khan Pathan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Secure Routing
◽
Mobile Ad Hoc
◽
Secure Routing Protocols
◽
Hoc Networks
Start Chat
Download Full-text
Secure Routing for Mobile Ad Hoc Networks
Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications - Wireless Networks and Mobile Communications
◽
10.1201/9781420013610.ch16
◽
2006
◽
pp. 477-503
Author(s):
Joo-Han Song
◽
Vincent Wong
◽
Victor Leung
◽
Yoji Kawamoto
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
ADAPTIVE AND SECURE ROUTING PROTOCOL FOR EMERGENCY MOBILE AD HOC NETWORKS
International Journal of Wireless & Mobile Networks
◽
10.5121/ijwmn.2010.2205
◽
2010
◽
Vol 2
(2)
◽
pp. 62-78
◽
Cited By ~ 5
Author(s):
Emmanouil A. Panaousis
◽
Tipu A. Ramrekha
◽
Grant P. Millar
◽
Christos Politis
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocol
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A new adaptive routing scheme based on the traffic characteristics in mobile ad hoc networks
Vehicular Technology Conference Fall 2000. IEEE VTS Fall VTC2000. 52nd Vehicular Technology Conference (Cat. No.00CH37152)
◽
10.1109/vetecf.2000.886849
◽
2002
◽
Cited By ~ 1
Author(s):
Sun-Ho Lee
◽
Dong-Ho Cho
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Adaptive Routing
◽
Routing Scheme
◽
Traffic Characteristics
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks
Communication and Networking - Communications in Computer and Information Science
◽
10.1007/978-3-642-17604-3_11
◽
2010
◽
pp. 102-111
Author(s):
Seungjin Park
◽
Seong-Moo Yoo
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Secure Routing
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks
International Journal of Communication Networks and Distributed Systems
◽
10.1504/ijcnds.2018.094218
◽
2018
◽
Vol 21
(2)
◽
pp. 157
Author(s):
Gautam M. Borkar
◽
A.R. Mahajan
Keyword(s):
Fuzzy Logic
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Dissemination
◽
Routing Scheme
◽
Secure Data
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A geographically pinned QoS routing scheme for mobile ad hoc networks
Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588)
◽
10.1109/icon.2002.1033333
◽
2003
◽
Cited By ~ 1
Author(s):
Chi-Hsiang Yeh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Qos Routing
◽
Routing Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close