2005 ◽  
Author(s):  
Patrick W. Fitzgibbons ◽  
Digen Das ◽  
Larry J. Hash

2014 ◽  
Vol 644-650 ◽  
pp. 3008-3011
Author(s):  
Qi An ◽  
Yong Jian Luo ◽  
Hai Yan Zhao ◽  
Jing Zhao

security objectives, and the commonly used Mobile Ad hoc networks security protection technology, and finally discusses the application of mobile Ad hoc network in the field, and their security policy are analyzed.


Sign in / Sign up

Export Citation Format

Share Document