References
- M. Gowsalayy, N. Karthick, S. Keerthana, and R. Durga, "Certificate Revocation Using Public Key Infrastructure For MANET's," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), pp. 1032-1035, 2014.
- G. Mohan and R. Ramachandran, "An improved Approach for MANET Security using Cluster Based Certificate Revocation," International Journal of Computer Science and Information Technologies (IJCSIT), pp.5781-5784, 2014.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang, and N. Kato "Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks," Parallel and Distributed Systems, IEEE Transactions on, pp.239-249, 2013.
- P. Virada, "Intrusion Detection System (IDS) for Secure MANETs: A Study," International Journal of Computational Engineering Research (ijceronline.com), pp.75-79, 2007.
- S. Madhavi and Dr. T. Kim, "An Intrusion Detection System in Mobile Ad hoc Networks," International Journal of Security and its Application, pp.1-16, 2008.
- M. Raya, M. Manshaei, M. Felegyhazi, and J.-P.Hubaux, "Revocation Games in Ephemeral Networks," Proceedings of the 15th ACM conference on Computer and communications security, pp.199-210, 2008.
- E. Elkind, G. Chalkiadakis, and N. R. Jennings, "Coalition structures in weighted voting games," Proc. 18th European Conf on AI (ECAI), pp.393-397, 2008.
- K. Park, H. Nishiyama, N. Ansari, and N. Kato, "Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks," Proc. IEEE 71st Vehicular Technology Conference (VTC), pp.16-19, 2010.
- K. Shalini and D. Swapna Mtech, "Certificate Revocation Using Threshold Based Approach in MANETs," International Journal for Development of Computer Science and Technology (IJDCST), pp. 1-7, 2013.
- H. Dahshan, F. Elsayed, A. Rohiem, A. Elgmoghazy, and J. Irvine, "A Trust Based Threshold Revocation Scheme for MANETs," Proc. IEEE 78st Vehicular Technology Conference (VTC), pp.1-5, 2013.