ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Distributed Security Scheme for Mobile Ad Hoc Networks
2006 IEEE International Conference on Information Acquisition
◽
10.1109/icia.2006.305988
◽
2006
◽
Cited By ~ 5
Author(s):
A. Nargunam
◽
M.P. Sebastian
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Distributed Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
International Journal of Electronics
◽
10.1080/00207217.2017.1285433
◽
2017
◽
Vol 104
(6)
◽
pp. 1034-1049
◽
Cited By ~ 4
Author(s):
Sunil Kumar
◽
Kamlesh Dutta
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attack
◽
Security Scheme
◽
Direct Trust
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Advances In Distributed Security For Mobile Ad Hoc Networks
Proceedings of the 17th International Conference on Computer Systems and Technologies 2016 - CompSysTech '16
◽
10.1145/2983468.2983480
◽
2016
◽
Cited By ~ 1
Author(s):
Jozef Filipek
◽
Ladislav Hudec
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Distributed Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
Distributed Computing - IWDC 2004 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30536-1_68
◽
2004
◽
pp. 541-542
Author(s):
Punit Rathod
◽
Nirali Mody
◽
Dhaval Gada
◽
Rajat Gogri
◽
Zalak Dedhia
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Security Scheme
◽
Malicious Node Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-011-0413-5
◽
2011
◽
Vol 67
(4)
◽
pp. 829-857
◽
Cited By ~ 2
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Scheme
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Cluster Based Security Scheme for Mobile Ad Hoc Networks
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)
◽
10.1109/wimob.2006.1696379
◽
2006
◽
Cited By ~ 2
Author(s):
S.A. Nargunam
◽
M.P. Sebastian
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Security and Privacy in Communication Networks
◽
10.1007/978-3-642-05284-2_3
◽
2009
◽
pp. 41-50
◽
Cited By ~ 15
Author(s):
Mansoor Alicherry
◽
Angelos D. Keromytis
◽
Angelos Stavrou
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Security Policy
◽
Ad Hoc
◽
Policy Enforcement
◽
Distributed Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks
2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)
◽
10.1109/imccc.2015.380
◽
2015
◽
Cited By ~ 1
Author(s):
Xuewen Wu
◽
Xiaokai Zhu
◽
Fei Kong
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Data Security
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A new security scheme for on-demand source routing in mobile ad hoc networks
Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07
◽
10.1145/1280940.1281063
◽
2007
◽
Cited By ~ 5
Author(s):
Woei-Jiunn Tsaur
◽
Haw-Tyng Pai
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Source Routing
◽
Security Scheme
◽
On Demand
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
2009 International Conference on Information Technology and Computer Science
◽
10.1109/itcs.2009.113
◽
2009
◽
Cited By ~ 2
Author(s):
Yu Yao
◽
Li Zhe
◽
Liu Jun
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Source Based Min-Max Battery Cost Routing Protocol for Mobile Ad Hoc Networks
CVR Journal of Science & Technology
◽
10.32377/cvrjst0408
◽
2013
◽
Vol 4
(1)
◽
pp. 41-44
Author(s):
Humaira Nishat
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close