Academic literature on the topic 'MobileAd-hoc network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MobileAd-hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MobileAd-hoc network"

1

Yamini, K. Anish Pon, Suthendran Kannan, and Arivoli Thangadurai. "Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network." Journal of Cyber Security and Mobility 7, no. 1 (2018): 39–52. http://dx.doi.org/10.13052/jcsm2245-1439.714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Bhavana, Vikas Jian, and Rajesh Tiwari. "Black hole Attack Detection in AODV-BTR MANET." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 10, no. 10 (2015): 2570–79. http://dx.doi.org/10.24297/ijmit.v10i10.5134.

Full text
Abstract:
Security is a vital requirement in mobile ad hoc networks to provide secured communication among mobile nodes. Due to different characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a powerful security solution that achieves both broad protection and desirable network performance. Mobile Ad hoc Network (MANET) has emerged as a new leading edge of technology to provide communication wherever and whenever required. As the wired network needs established infrastructure for communication but the mobil
APA, Harvard, Vancouver, ISO, and other styles
3

Komninos, Nikos, Dimitrios D. Vergados, and Christos Douligeris. "Multifold node authentication in mobilead hoc networks." International Journal of Communication Systems 20, no. 12 (2007): 1391–406. http://dx.doi.org/10.1002/dac.882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Richard Yu, F., Helen Tang, Victor C. M. Leung, Jie Liu, and Chung-Horng Lung. "Biometric-based user authentication in mobilead hoc networks." Security and Communication Networks 1, no. 1 (2008): 5–16. http://dx.doi.org/10.1002/sec.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Low, Chor Ping, and Chau Yuen. "Energy efficient broadcast routing in mobilead hoc networks." International Journal of Communication Systems 17, no. 4 (2004): 375–88. http://dx.doi.org/10.1002/dac.649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Zhensheng, and Qian Zhang. "Delay/disruption tolerant mobilead hoc networks: latest developments." Wireless Communications and Mobile Computing 7, no. 10 (2007): 1219–32. http://dx.doi.org/10.1002/wcm.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Ji-Hoon, and Sung-Bong Yang. "Double-layered Peer-to-Peer Systems in MobileAd-hoc Networks." KIPS Transactions:PartC 17C, no. 1 (2010): 61–68. http://dx.doi.org/10.3745/kipstc.2010.17c.1.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Papanastasiou, Stylianos, and Mohamed Ould-Khaoua. "Exploring the performance of TCP vegas in mobilead hoc networks." International Journal of Communication Systems 17, no. 2 (2004): 163–77. http://dx.doi.org/10.1002/dac.638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhai, Hongqiang, Jianfeng Wang, Xiang Chen, and Yuguang Fang. "Medium access control in mobilead hoc networks: challenges and solutions." Wireless Communications and Mobile Computing 6, no. 2 (2006): 151–70. http://dx.doi.org/10.1002/wcm.376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mizanur Rahman, Sk Md, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, and Eiji Okamoto. "Anonymous authentication and secure communication protocol for wireless mobilead hoc networks." Security and Communication Networks 1, no. 2 (2008): 179–89. http://dx.doi.org/10.1002/sec.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "MobileAd-hoc network"

1

Chiang, Meng-chih, and 姜孟志. "Hash-based Anonymous Secure Routing Protocol in MobileAd Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/34876413817944638679.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>98<br>The mobile ad hoc network (MANET) is a non-fixed infrastructure wireless network, composing by a collection of wireless mobile devices which can communicate with others freely. Some applications, such as the e-business or interpersonal communication, may be applied in mobile ad hoc environments in the near future. For this reason, anonymity and security become momentous issues for MANETs. When mobile devices communicate without any protection, adversaries can easily launch attacks by collecting route control packets and data packets through eavesdropping. The p
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!