Advances in Natural and Applied Sciences New Format.docx
暂无分享,去创建一个
[1] Sarmistha Neogy,et al. Secure checkpointing-recovery using trusted nodes in MANET , 2013, 2013 4th International Conference on Computer and Communication Technology (ICCCT).
[2] Xi Chen,et al. Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Charles B. Owen,et al. Factors affecting the performance of ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[4] Tameem Eissa,et al. Enhancing MANET Security Using Secret Public Keys , 2009, 2009 International Conference on Future Networks.
[5] Feng Luo,et al. A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles , 2004, Bioinform..
[6] J. Trostle. Applying network address encryption to anonymity and preventing data exfiltration , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.