Author of the publication

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks.

, , , , and . IEEE Trans. Veh. Technol., 60 (3): 1025-1036 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing., , , , and . CNS, page 450-456. IEEE, (2016)An architecture for secure interoperability between coalition tactical MANETs., , , , , and . MILCOM, page 37-42. IEEE, (2015)LAA: Link-layer anonymous access for tactical MANETs., and . MILCOM, page 1-7. IEEE, (2012)Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios., , , , and . CoRR, (2016)Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning., , , , and . IEEE Trans. Vehicular Technology, 63 (9): 4647-4658 (2014)Enhancing interoperability in heterogeneous mobile wireless networks for disaster response., , , , and . IEEE Trans. Wirel. Commun., 8 (5): 2424-2433 (2009)Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks., , , and . IET Commun., 6 (8): 974-983 (2012)Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks., , , , and . IEEE Trans. Veh. Technol., 60 (3): 1025-1036 (2011)A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community., , , and . IEEE Open J. Commun. Soc., (2020)A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions., , , , and . Proc. IEEE, 100 (12): 3172-3186 (2012)