Efficient ECGDH algorithm through protected multicast routing protocol in MANETs
暂无分享,去创建一个
[1] Mhm Krishna Prasad,et al. An Implementation Analysis and Evaluation Study of DSR with Inactive DoS Attack in Mobile Ad hoc Networks , 2013 .
[2] Shailendra Kumar Shrivastava,et al. Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .
[3] Yong Wang,et al. The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks , 2006, 2006 IEEE International Conference on Communications.
[4] Upendra Singh,et al. Secure data transmission on MANET by hybrid cryptography technique , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[5] Ashish Kumar Jain Ravindra Verma. TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS , 2015 .
[6] Upendra Singh,et al. Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[7] Shweta Shah,et al. Wormhole attack in mobile ad-hoc networks , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[8] Upendra Singh,et al. Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[9] Jie Liu,et al. A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol , 2010, Int. J. Netw. Secur..
[10] Vrinda Tokekar,et al. Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[11] Upendra Singh,et al. Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[12] Erukala Suresh Babu,et al. Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks , 2016, Int. J. Netw. Secur..
[13] Shah Shweta,et al. MITIGATION FOR JELLY FISH ATTACK ON MANET , 2016 .
[14] E. Babu,et al. An Implementation and Performance Evaluation Study of AODV, MAODV, RAODV in Mobile Ad hoc Networks , 2013 .
[15] Erukala Suresh Babu,et al. Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks , 2015, ACSS.
[16] Vrinda Tokekar,et al. Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.