From post

A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.

, , , , и . KES-AMSTA, том 4953 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks., , , и . Int. J. Comput. Intell. Syst., 5 (5): 878-886 (2012)A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks., , , , и . COMPSAC, стр. 68-71. IEEE Computer Society, (2008)A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks., , , , и . KES-AMSTA, том 4953 из Lecture Notes in Computer Science, стр. 584-593. Springer, (2008)