Advances in Natural and Applied Sciences New Format.docx

[1]  Sarmistha Neogy,et al.  Secure checkpointing-recovery using trusted nodes in MANET , 2013, 2013 4th International Conference on Computer and Communication Technology (ICCCT).

[2]  Xi Chen,et al.  Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Charles B. Owen,et al.  Factors affecting the performance of ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[4]  Tameem Eissa,et al.  Enhancing MANET Security Using Secret Public Keys , 2009, 2009 International Conference on Future Networks.

[5]  Feng Luo,et al.  A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles , 2004, Bioinform..

[6]  J. Trostle Applying network address encryption to anonymity and preventing data exfiltration , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.