1 |
Kush, A., Hwang, C., Gupta, P., "Secured Routing Scheme for Adhoc Networks," International Journal of Computer Theory and Engineering(IJCTE) 3, pp.1793-1799, 2009.
|
2 |
Varadharajan, V., Shankaran, R., Hitchens, M., "Security for cluster based ad hoc networks," Computer Communications, No. 27, Vol. 5, pp.488-501, 2004.
DOI
ScienceOn
|
3 |
Gomathi, S., Duraiswamy, K., "Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting," International Journal on Computer Science and Engineering(IJCSE) 02(03), pp.865-869, 2010.
|
4 |
Tseng, Y. Min., "A heterogeneous-network aided public-key management scheme for MANET," Wiley InterScience, International Journal Net. Mgmt Vol. 17, pp.3-15, 2006.
|
5 |
V. S. Miller, "The Weil Pairing, and Its Efficient Calculation," Journal of Cryptology, Vol. 17, No. 4, pp.235-261, 2004.
|
6 |
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security, pp.30-40, 2003.
|
7 |
K. Hoeper and G. Gong, "Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks," International Conference on AD-HOC Networks & Wireless (AD HOC NOW '06), LNCS 4104, Springer Verlag, pp.224-237, 2006.
|