Amanote Research

Amanote Research

    RegisterSign In

Implementation of EnhancedSecurity AlgorithmsinMobile Ad Hoc Networks

International Journal of Computer Network and Information Security
doi 10.5815/ijcnis.2014.02.05
Full Text
Open PDF
Abstract

Available in full text

Date

January 8, 2014

Authors
M. MadhuryaB.Ananda KrishnaT. Subhashini
Publisher

MECS Publisher


Related search

Design and Implementation of MAC Protocol for Underwater Mobile Ad-Hoc Networks

Journal of the Institute of Electronics and Information Engineers
2014English

Mobile Ad-Hoc Networks: MANET

Trendovi u poslovanju
2018English

Robust Wireless Ad Hoc Networks

2003English

Wireless Ad-Hoc Control Networks

English

Ad-Hoc Networks Energy Consumption: A Review of the Ad-Hoc Routing Protocols

Journal of Engineering Science and Technology Review
Engineering
2010English

Service Placement in Ad Hoc Networks

SpringerBriefs in Computer Science
Computer Science
2012English

Reliability Evaluation of Mobile Ad-Hoc Networks

International Journal of Future Generation Communication and Networking
Computer NetworksCommunications
2015English

MIMO Communications in Ad Hoc Networks

IEEE Transactions on Signal Processing
Electronic EngineeringSignal ProcessingElectrical
2006English

Preemptive Routing in Ad Hoc Networks

Journal of Parallel and Distributed Computing
Computer NetworksHardwareCommunicationsArchitectureTheoretical Computer ScienceArtificial IntelligenceSoftware
2003English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy