1 |
B. Kadri, A. M'hamed, and M. Feham, "Secured Clustering Algorithm for Mobile Ad Hoc Networks," Int. J. of Computer Science and Network Security IJCSNS, vol. 7, no. 3, Mar. 2007, pp. 27-34.
|
2 |
Y.-D. Kim, "Performance of VoIP Traffics over MANETs under DDoS Intrusions," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 493-498.
과학기술학회마을
|
3 |
X. Jia, J. Wu, and Y. He, "Mobile Ad-hoc and Sensor Networks," Proc. Lecture Notes in Computer Science First International Conference MSN 2005, vol. 3794, Springer, 2005, pp. 164-174.
|
4 |
Y.-D. Kim, "Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions," J. of The Korea Institute of Electronic Communication Sciences vol. 7, no. 2, 2012, pp. 258-263.
과학기술학회마을
|
5 |
R. Zheng and R. Kravets, "On-demand power management for Ad Hoc networks," Twenty-Second Annual Joint Conf. of the IEEE Computer and Communications Societies 2003 (INFOCOM 2003), vol. 1, Mar. 2003, pp. 481-491.
|
6 |
K. Kim, S. Bae, and D. Kim, "An Enhanced Robust Routing Protocol in AODV over MANETs," J. of The Korea Institute of Electronic Communication Sciences, vol. 4, no. 1, 2009, pp. 13-18.
과학기술학회마을
|
7 |
C.-K. Toh, "Ad Hoc Mobile Wireless Networks Protocols and System," Prentice Hall, Jan. 2004, pp. 200-252.
|
8 |
A. Patwardhan, J. Parker, A. Joshi, A. Karygiannis, and M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks," Third IEEE Int. Conf. on Pervasive Computing and Communications, Mar. 2005.
|
9 |
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password authenticated key exchange using Diffie_Hellman," Advances in Cryptology-Eurocrypt 2000, May 2000, pp. 14-18.
|
10 |
C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-803.
과학기술학회마을
|