ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Routing security and data confidentiality for mobile ad hoc networks
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring.
◽
10.1109/vetecs.2003.1207138
◽
2004
◽
Cited By ~ 3
Author(s):
Keng Seng Ng
◽
W.K.G. Seah
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Confidentiality
◽
Routing Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Secure Multipath Routing for Data Confidentiality in Mobile Ad Hoc Networks
Research Journal of Applied Sciences Engineering and Technology
◽
10.19026/rjaset.6.3716
◽
2013
◽
Vol 6
(13)
◽
pp. 2415-2422
Author(s):
P. Sandhya
◽
Julia Punitha Malar Dhas
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Multipath Routing
◽
Data Confidentiality
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks
Computer Communications
◽
10.1016/j.comcom.2005.06.025
◽
2006
◽
Vol 29
(8)
◽
pp. 1121-1132
◽
Cited By ~ 11
Author(s):
Jung-Shian Li
◽
Cheng-Ta Lee
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Algorithm
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
SPREAD: enhancing data confidentiality in mobile ad hoc networks
IEEE INFOCOM 2004
◽
10.1109/infcom.2004.1354662
◽
2005
◽
Cited By ~ 35
Author(s):
Wenjing Lou
◽
Wei Liu
◽
Yuguang Fang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Confidentiality
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Routing security and authentication mechanism for mobile ad hoc networks
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
◽
10.1109/vetecf.2004.1404987
◽
2005
◽
Cited By ~ 5
Author(s):
Yuh-Ren Tsai
◽
Shiuh-Jeng Wang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Authentication Mechanism
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Reputation methods for routing security for mobile ad hoc networks
SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications
◽
10.1109/tic.2003.1249106
◽
2004
◽
Cited By ~ 3
Author(s):
Po-Wah Yau
◽
C.J. Mitchell
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Advances in Computer Science and Information Technology. Networks and Communications
◽
10.1007/978-3-642-27299-8_51
◽
2012
◽
pp. 490-499
◽
Cited By ~ 1
Author(s):
Hamza Aldabbas
◽
Helge Janicke
◽
Radwan AbuJassar
◽
Tariq Alwada’n
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Confidentiality
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Confidentiality And Privacy
Download Full-text
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-011-0413-5
◽
2011
◽
Vol 67
(4)
◽
pp. 829-857
◽
Cited By ~ 2
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Scheme
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Data Confidentiality in Mobile Ad hoc Networks
International Journal of Wireless & Mobile Networks
◽
10.5121/ijwmn.2012.4117
◽
2012
◽
Vol 4
(1)
◽
pp. 225-236
◽
Cited By ~ 8
Author(s):
Hamza Aldabbas
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Data Confidentiality
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v5i12.243248
◽
2017
◽
Vol 5
(12)
◽
pp. 243-248
Author(s):
Y. Vasudeva Reddy
◽
◽
◽
M. Nagendra
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Multipath Routing
◽
Security Protocols
◽
Routing Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing
◽
10.1016/s0743-7315(02)00065-5
◽
2003
◽
Vol 63
(2)
◽
pp. 214-227
◽
Cited By ~ 30
Author(s):
Lakshmi Venkatraman
◽
Dharma P. Agrawal
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close