From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance evaluation of anonymous routing protocols in MANETs., , , и . WCNC, стр. 646-651. IEEE, (2006)A secure ad-hoc routing approach using localized self-healing communities., , , , , и . MobiHoc, стр. 254-265. ACM, (2005)GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks.. IACR Cryptology ePrint Archive, (2006)Building Underwater Ad-Hoc Networks and Sensor Networks For Large Scale Real-Time Aquatic Applications, , , и . Proceedings of the IEEE MILCOM, Atlantic City, NJ, USA, (октября 2005)Visualisation of wormholes in underwater sensor networks: a distributed approach., , , и . Int. J. Secur. Networks, 3 (1): 10-23 (2008)Random flow network modeling and simulations for DDoS attack mitigation., , , , , и . ICC, стр. 487-491. IEEE, (2003)Modeling Ad-hoc rushing attack in a negligibility-based security framework., , и . Workshop on Wireless Security, стр. 55-64. ACM, (2006)Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks., , , и . BIBE, стр. 914-921. IEEE Computer Society, (2007)Filtering false data via authentic consensus in vehicle ad hoc networks., , , , и . Int. J. Auton. Adapt. Commun. Syst., 3 (2): 217-235 (2010)Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes., , и . IEEE Trans. Veh. Technol., 58 (5): 2406-2416 (2009)