4.5 Article

Energy efficient secured routing protocol for MANETs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

Tong Meng et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Information Systems

Leveraging software-defined networking for security policy enforcement

Jiaqiang Liu et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Theory & Methods

Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs

Jun Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter

Guang Yao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks

Xin Ming Zhang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Review Computer Science, Hardware & Architecture

Information centric network: Research challenges and opportunities

Athanasios V. Vasilakos et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2015)

Article Computer Science, Information Systems

Survey on channel reciprocity based key establishment techniques for wireless systems

Tao Wang et al.

WIRELESS NETWORKS (2015)

Article Computer Science, Hardware & Architecture

Provably secure three-party authenticated key agreement protocol using smart cards

Haomin Yang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

Routing Metrics of Cognitive Radio Networks: A Survey

Moustafa Youssef et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Theory & Methods

Toward Incentivizing Anti-Spoofing Deployment

Bingyang Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing

Peng Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

A survey on trust management for Internet of Things

Zheng Yan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

Security of the Internet of Things: perspectives and challenges

Qi Jing et al.

WIRELESS NETWORKS (2014)

Article Computer Science, Information Systems

Directional routing and scheduling for green vehicular delay tolerant networks

Yuanyuan Zeng et al.

WIRELESS NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Approximating Congestion plus Dilation in Networks via Quality of Routing Games

Costas Busch et al.

IEEE TRANSACTIONS ON COMPUTERS (2012)

Article Computer Science, Information Systems

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2012)

Article Engineering, Electrical & Electronic

A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

Alireza Attar et al.

PROCEEDINGS OF THE IEEE (2012)

Article Engineering, Electrical & Electronic

Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks

Liang Zhou et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)

Article Computer Science, Interdisciplinary Applications

Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs

Yun-Sheng Yen et al.

MATHEMATICAL AND COMPUTER MODELLING (2011)

Article Engineering, Electrical & Electronic

SPM: Source Privacy for Mobile Ad Hoc Networks

Jian Ren et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2010)

Article Computer Science, Artificial Intelligence

Context-Aware Middleware for Multimedia Services in Heterogeneous Networks

Liang Zhou et al.

IEEE INTELLIGENT SYSTEMS (2010)

Article Computer Science, Hardware & Architecture

DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis

Zubair M. Fadlullah et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2010)

Article Computer Science, Information Systems

Quality of Service in mobile ad hoc networks: a survey

Ash Mohammad Abbas et al.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2010)