1 |
J. Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks," Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp. 476-481.
|
2 |
J. Sen, P. R. Chowdhury, I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.
|
3 |
K. Naik (Joshi), A. Dixit, "Resource Aware Node Authentication Framework for Secure MANET," IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, 2014, pp. 109-113.
|
4 |
왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.
|
5 |
M. K. Rafsanjani, A. Movaghar, "Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks," World Applied Sciences Journal, Vol. 4, No. 3, 2008, pp. 444-449.
|
6 |
Kush, A., Hwang, C., Gupta, P., "Secured Routing Scheme for Adhoc Networks," International Journal of Computer Theory and Engineering (IJCTE) 3, Vol. 60, No. 1, 2013, pp. 1089-1098.
|
7 |
P. Singh, M. Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks," International Conference on Recent Trends in Engineering and Technology, 2012.
|
8 |
왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
|
9 |
Gomathi, S., Duraiswamy, K., "Guaranteed Packet Transfer in MANET", In and Out of Coverage Areas and Energy Saving Using Random Casting (IJCSE) International Journal on Computer Science and Engineering 02(03), 2010, pp. 865-869.
|
10 |
J. Sen, P. R. Chowdhury, and I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.
|
11 |
M. Cagalj, S. Capkun, and J. P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," Proceedings of IEEE, Special Issue on Security and Cryptography, Vol. 94, No. 2, 2006, pp. 467-478.
|