Development and validation of a NS2 protocol for data security at network layer
暂无分享,去创建一个
[1] Christian Callegari,et al. Design, development and validation of an NS2 module for dynamic LSP rerouting , 2006, 2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks.
[2] Shijun Zhao,et al. Simulation analysis of congestion control in WSN based on AQM , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).
[3] Vikas Sharma,et al. Differentiated services with multiple random early detection algorithm using ns2 simulator , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[4] Lei Xu,et al. DYMO routing protocol research and simulation based on NS2 , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[5] Guanghui Li,et al. The research of routing algorithms based on NS2 in mobile ad hoc networks , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.
[6] Ruoshan Kong. The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.
[7] William Stallings,et al. Cryptography and network security , 1998 .
[8] Suresh Kumar,et al. Traffic pattern based performance comparison of two reactive routing protocols for Ad hoc networks using NS2 , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[9] Jean-Luc Meunier,et al. Pollen: using people as a communication medium , 2001, Comput. Networks.
[10] P. Chenna Reddy,et al. Performance Analysis of Adhoc Network Routing Protocols , 2006 .
[11] Chris Xu,et al. Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .
[12] Yatao Yang,et al. Protocols simulation and performance analysis in wireless network based on NS2 , 2011, 2011 International Conference on Multimedia Technology.
[13] Hong Jiang,et al. Simulation and Analysis of MAC Security Based on NS2 , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[14] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[15] Asma Tuteja,et al. Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET Using NS2 , 2010, 2010 International Conference on Advances in Computer Engineering.
[16] N.M. Din,et al. IPQit: An internet simulation kit based on NS2 , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[17] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[18] Runcai Huang,et al. Simulation and Analysis of MFlood Protocol in Wireless Network , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[19] Wang Jun,et al. Application of NS2 in Education of Computer Networks , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.