1 |
R. Murugan and A. Shanmugam, "A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks", Journal of Computer Science 6.12 (2010). Article (CrossRef Link)
|
2 |
Abderrezak RACHEDI and Abderrahim BENSLIMANE, "Impacts and Solutions of Control Packets Vulnerabilities with IEEE 802.11 MAC", Wireless communications and mobile computing 9.4 (2009). Article (CrossRef Link)
|
3 |
G.A. Safdar and M. McLoone, "Randomly Shifted Certification Authority Authentication Protocol for MANETs", Mobile and Wireless Communications Summit, 2007, 16th IST, IEEE, 2007. Article (CrossRef Link)
|
4 |
Sadasivam, Karthik and T. Andrew Yang. "Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks". M.H. Hamza, P. Prapinmonkolkarn, T. Angkaew. (Eds): Proc. of the IASTED Int. Multi-Conf. on Networks and Communication Systems (NCS 2005).Krabi, Thailand. April'18-20, 2005. Article (CrossRef Link)
|
5 |
Hongqiang Zhai, Jianfeng Wang, Xiang Chen and Yuguang Fang, "Medium access control in mobile ad hoc networks: challenges and solutions", Wireless Communications and Mobile Computing 6.2 (2006). Article (CrossRef Link)
|
6 |
Gaurav Kulkarni and Brajesh Patel, "Time Stamp Based Cross Layer MANET Security Protocol", Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 10 Version 1.0 Year 2013. Article (CrossRef Link)
|
7 |
K.Suresh Babu and K.Chandra Sekharaiah, "CBDAT: Cross Layer Based Detection and Authentication Technique for MANET", IJCSNS International Journal of Computer Science and Network Security, 22 VOL.13 No.7, July 2013. Article (CrossRef Link)
|
8 |
Gulshan Kumar and Mritunjay Rai, "Assured Neighbor Based Counter Protocol on Mac-Layer Providing Security in Mobile Ad Hoc Networks", Academy & Industry Research Collaboration Center, Jul 2011. Article (CrossRef Link)
|
9 |
Alejandro Cornejo, Nancy Lynch, Saira Viqar and Jennifer L. Welch, "Neighbor Discovery in Mobile Ad Hoc Networks Using an Abstract MAC Layer", Communication, Control, and Computing, 2009. Allerton 2009 47th Annual Allerton Conference on IEEE 2009. Article (CrossRef Link)
|
10 |
Network Simulator, Article (CrossRef Link)
|
11 |
T.R.Panke, "Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET", International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013. Article (CrossRef Link)
|
12 |
A. Praveena and L.M. Nithya, "Cluster Enhanced Secure Authentication Scheme For Data Integrity In MANET", International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April-2014, pg. 693-700. Article (CrossRef Link)
|
13 |
Priti Rathi and Parikshit Mahalle, "Proposed Threshold Based Certificate Revocation in Mobile Ad Hoc Networks", Intelligent Computing, Networking and Informatics ,Advances In Intelligent Systems and Computing , Volume 243,2014,pp377-388. Article (CrossRef Link)
|
14 |
T.Buvaneswari and A. Antony Truth Ayaraj, "Novel Accuser of Security Based Certificate Revocation in MANET", International Global Research Analysis (GRA), Vol. 2, Issue. 11, pp. 94-98, Nov 2013. Article (CrossRef Link)
|