Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/kesamsta/FuHLLR08
%A Fu, Yingfang
%A He, Jingsha
%A Luan, Liangyu
%A Li, Guorui
%A Wang, Rong
%B KES-AMSTA
%D 2008
%E Nguyen, Ngoc Thanh
%E Jo, GeunSik
%E Howlett, Robert J.
%E Jain, Lakhmi C.
%I Springer
%K dblp
%P 584-593
%T A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
%U http://dblp.uni-trier.de/db/conf/kesamsta/kesamsta2008.html#FuHLLR08
%V 4953
%@ 978-3-540-78581-1
@inproceedings{conf/kesamsta/FuHLLR08,
added-at = {2017-06-04T00:00:00.000+0200},
author = {Fu, Yingfang and He, Jingsha and Luan, Liangyu and Li, Guorui and Wang, Rong},
biburl = {https://www.bibsonomy.org/bibtex/2188e5effe649575658fd4827804a31a3/dblp},
booktitle = {KES-AMSTA},
crossref = {conf/kesamsta/2008},
editor = {Nguyen, Ngoc Thanh and Jo, GeunSik and Howlett, Robert J. and Jain, Lakhmi C.},
ee = {https://doi.org/10.1007/978-3-540-78582-8_59},
interhash = {f3e65e04bdaf1148732e6896b00fc96a},
intrahash = {188e5effe649575658fd4827804a31a3},
isbn = {978-3-540-78581-1},
keywords = {dblp},
pages = {584-593},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T00:53:17.000+0200},
title = {A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.},
url = {http://dblp.uni-trier.de/db/conf/kesamsta/kesamsta2008.html#FuHLLR08},
volume = 4953,
year = 2008
}