Ordering: A reliable qualitative information for the alignment of sketch and metric maps
S Jan, J Wang, A Schwering… - 2013 IEEE 12th …, 2013 - ieeexplore.ieee.org
Sketch maps are externalizations of cognitive maps which are typically distorted,
schematized, incomplete, and generalized. Processing spatial information from sketch maps …
schematized, incomplete, and generalized. Processing spatial information from sketch maps …
Membership models and the design of authentication protocols for MANETs
S Maity, RC Hansdah - 2012 26th International Conference on …, 2012 - ieeexplore.ieee.org
Authentication protocols are very much essential for secure communication in mobile ad hoc
networks (MANETs). A number of authentication protocols for MANETs have been proposed …
networks (MANETs). A number of authentication protocols for MANETs have been proposed …
Hybrid Algorithm for Malicious Node Detection and Secure Routing using Cryptographic Applications in MANET
S Muruganandam, J Renjit - … of the First International Conference on …, 2021 - eudl.eu
Abstract In Mobile Ad-hoc network every node can change its position dynamically without
having any fixed infrastructure. The path information is maintained permanently for routing …
having any fixed infrastructure. The path information is maintained permanently for routing …
A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation
S Maity, RC Hansdah - 2013 27th International Conference on …, 2013 - ieeexplore.ieee.org
In this paper, we propose a novel authentication protocol for MANETs requiring stronger
security. The protocol works on a two-tier network architecture with client nodes and …
security. The protocol works on a two-tier network architecture with client nodes and …
Securing Nodes in MANETs Using Node Based Key Management Scheme
S Tapaswi, VS Kushwah - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a kind of wireless communication infrastructure that
does not have base stations or routers. Each node acts as a router and is responsible for …
does not have base stations or routers. Each node acts as a router and is responsible for …
[图书][B] Soluciones para la autenticación y gestión de subredes en manets y vanets
CC Gil - 2012 - search.proquest.com
Soluciones para la autenticación y gestión de subredes en MANETs y VANETs Page 1
Soluciones para la autenticación y gestión de subredes en MANETs y VANETs Directora PINO …
Soluciones para la autenticación y gestión de subredes en MANETs y VANETs Directora PINO …
[PDF][PDF] ALGORITHMS BASED ON SPIDER DADDY LONG LEGS FOR FINDING THE OPTIMAL ROUTE IN SECURING MOBILE AD HOC NETWORKS
KI GHATHWAN - etd.uum.edu.my
Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks,
such as the black hole attack. One of the goals in the research is to find a method to prevent …
such as the black hole attack. One of the goals in the research is to find a method to prevent …
Security and performance analysis of the SEAP authentication protocol in MANETs
S Maity, RC Hansdah - International Journal of Ad Hoc and …, 2017 - inderscienceonline.com
This paper describes and analyses a secure and efficient authentication protocol (SEAP)
designed for mobile ad-hoc networks (MANETs). The SEAP protocol is a server coordination …
designed for mobile ad-hoc networks (MANETs). The SEAP protocol is a server coordination …
[PDF][PDF] A Dynamic Solution for Encryption Challenges in Ubiquitous Environment
Today'stechnological development is mainly focusing on the automation of processes at
hardware or software level ie to make them capable of adjusting themselves according to …
hardware or software level ie to make them capable of adjusting themselves according to …
[PDF][PDF] Mobile Computing Security for Ad Hoc Networks Using Authentication
VS Kushwah, AKS Sanger, KK Chauhan - researchgate.net
Today security is important everywhere and anywhere. Because channel communication
between two or more networks or nodes is not easy. An attacker or unwanted disaster may …
between two or more networks or nodes is not easy. An attacker or unwanted disaster may …