Amanote Research

Amanote Research

    RegisterSign In

Constraints and Approaches for Distributed Mobile AD-HOC Network Security

doi 10.21236/ada442043
Full Text
Open PDF
Abstract

Available in full text

Date

November 1, 2005

Authors
Patrick W. FitzgibbonsDigen DasLarry J. Hash
Publisher

Defense Technical Information Center


Related search

Distributed Multicast Group Security Architecture for Mobile Ad Hoc Networks

2006English

Self Umpiring System for Security in Wireless Mobile Ad Hoc Network

Wireless Sensor Network
2010English

Literature Survey on Distributed Mutual Exclusion Algorithm for Mobile Ad-Hoc Network

International Journal of Engineering Research and
2015English

Secure Routing Architecture for Mobile Ad Hoc Network

International Journal for Research in Applied Science and Engineering Technology
2019English

An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack

International Journal of Computer Applications
2014English

On the Security of a Lightweight Authentication and Encryption Scheme for Mobile Ad Hoc Network

Security and Communication Networks
Computer NetworksInformation SystemsCommunications
2015English

Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks

Journal of Computer and Communications
2014English

Secure Neighbor Position Verification for Mobile Ad Hoc Network

IJARCCE
2015English

Security in AODV Protocol Routing for Mobile Ad Hoc Networks

Ingeniería, investigación y tecnología
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy