共 50 条
- [31] Secure Key Distribution for Mobile Ad Hoc Networks [J]. IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
- [33] A graph-based approach to compute multiple paths in mobile ad hoc networks [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 323 - 331
- [34] On Optimal Video Transmission over Multiple Paths in Wireless Ad-Hoc Networks [J]. 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 319 - 322
- [35] An Identification based Authentication Protocol for Secure Data Transmission in Ad-Hoc Networks [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2012, 5 (02): : 107 - 120
- [36] Survey on Secure Routing in Mobile Ad-hoc Networks [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
- [38] PAYFLUX - Secure electronic payment in mobile ad hoc networks [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 66 - 78
- [39] Energy Aware Secure Clustering in Mobile Ad hoc Networks [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 241 - 246
- [40] A secure and pragmatic routing protocol for mobile ad hoc networks [J]. J. Donghua Univ, 2008, 1 (11-15):