Contents
Academic literature on the topic 'MobileAd-hoc network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MobileAd-hoc network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MobileAd-hoc network"
Yamini, K. Anish Pon, Suthendran Kannan, and Arivoli Thangadurai. "Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network." Journal of Cyber Security and Mobility 7, no. 1 (2018): 39–52. http://dx.doi.org/10.13052/jcsm2245-1439.714.
Full textGupta, Bhavana, Vikas Jian, and Rajesh Tiwari. "Black hole Attack Detection in AODV-BTR MANET." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 10, no. 10 (2015): 2570–79. http://dx.doi.org/10.24297/ijmit.v10i10.5134.
Full textKomninos, Nikos, Dimitrios D. Vergados, and Christos Douligeris. "Multifold node authentication in mobilead hoc networks." International Journal of Communication Systems 20, no. 12 (2007): 1391–406. http://dx.doi.org/10.1002/dac.882.
Full textRichard Yu, F., Helen Tang, Victor C. M. Leung, Jie Liu, and Chung-Horng Lung. "Biometric-based user authentication in mobilead hoc networks." Security and Communication Networks 1, no. 1 (2008): 5–16. http://dx.doi.org/10.1002/sec.6.
Full textLow, Chor Ping, and Chau Yuen. "Energy efficient broadcast routing in mobilead hoc networks." International Journal of Communication Systems 17, no. 4 (2004): 375–88. http://dx.doi.org/10.1002/dac.649.
Full textZhang, Zhensheng, and Qian Zhang. "Delay/disruption tolerant mobilead hoc networks: latest developments." Wireless Communications and Mobile Computing 7, no. 10 (2007): 1219–32. http://dx.doi.org/10.1002/wcm.518.
Full textKim, Ji-Hoon, and Sung-Bong Yang. "Double-layered Peer-to-Peer Systems in MobileAd-hoc Networks." KIPS Transactions:PartC 17C, no. 1 (2010): 61–68. http://dx.doi.org/10.3745/kipstc.2010.17c.1.061.
Full textPapanastasiou, Stylianos, and Mohamed Ould-Khaoua. "Exploring the performance of TCP vegas in mobilead hoc networks." International Journal of Communication Systems 17, no. 2 (2004): 163–77. http://dx.doi.org/10.1002/dac.638.
Full textZhai, Hongqiang, Jianfeng Wang, Xiang Chen, and Yuguang Fang. "Medium access control in mobilead hoc networks: challenges and solutions." Wireless Communications and Mobile Computing 6, no. 2 (2006): 151–70. http://dx.doi.org/10.1002/wcm.376.
Full textMizanur Rahman, Sk Md, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, and Eiji Okamoto. "Anonymous authentication and secure communication protocol for wireless mobilead hoc networks." Security and Communication Networks 1, no. 2 (2008): 179–89. http://dx.doi.org/10.1002/sec.4.
Full textDissertations / Theses on the topic "MobileAd-hoc network"
Chiang, Meng-chih, and 姜孟志. "Hash-based Anonymous Secure Routing Protocol in MobileAd Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/34876413817944638679.
Full text