UMPIRING SECURITY MODELS FOR MANETS

被引:0
|
作者
Kathirvel, Ayyaswamy [1 ]
机构
[1] Anna Univ, Fac Informat & Commun Engn, Madras, Tamil Nadu, India
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:39 / 40
页数:2
相关论文
共 50 条
  • [1] SECURITY MECHANISM FOR MANETS
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2009, 4 (02) : 231 - 242
  • [2] On the Security of Route Discovery in MANETs
    Burmester, Mike
    de Medeiros, Breno
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (09) : 1180 - 1188
  • [3] A Security Service Protocol for MANETs
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1076 - 1077
  • [4] Security through Collaboration in MANETs
    Li, Wenjia
    Parker, James
    Joshi, Anupam
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 696 - 714
  • [5] Security of Predefined Groups in MANETs
    Lebegue, Jerome
    Bidan, Christophe
    Plesse, Thierry
    [J]. Q2SWINET'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON Q2S AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2007, : 164 - 167
  • [6] UMPIRING CONTROVERSY
    SAXE, L
    [J]. SOCIETY, 1985, 22 (06) : 39 - 43
  • [7] Security routing in MANETs - a comparitive study
    Adibi, Sasan
    Erfani, Shervin
    Harbi, Hani
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 2 - 2
  • [8] Security and Interoperability for MANETs and a Fixed Core
    O'Halloran, Colin
    Bates, Andy
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 5 - 11
  • [9] Security routing in MANETs - A comparative study
    Adibi, Sasan
    Erfani, Shervin
    Harbi, Hani
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 625 - 630
  • [10] Security Through Collaboration and Trust in MANETs
    Li, Wenjia
    Parker, James
    Joshi, Anupam
    [J]. MOBILE NETWORKS & APPLICATIONS, 2012, 17 (03): : 342 - 352