Author of the publication

Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks.

, , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 1446-1451. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems., , , and . PDPTA, page 1229-1238. CSREA Press, (1997)Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches., , and . GLOBECOM, page 1-6. IEEE, (2009)Identification and Validation of Spatio-Temporal Associations in Wireless Sensor Networks, , and . Sensor Technologies and Applications, International Conference on, (2009)Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks., , , and . WCNC, page 3341-3346. IEEE, (2007)Mobile Agents to Automate Fault Management in Wireless and Mobile Networks., , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 1296-1300. Springer, (2000)A context-aware prefetching strategy for mobile computing environments., , , and . IWCMC, page 1109-1116. ACM, (2006)Performance Analysis of DSR using Cached Route Replies for Multihop Wireless Networks., , and . ICWN, page 203-212. CSREA Press, (2005)A Distributed Multicast Routing Protocol for Real-Time Multicast Applications., , , and . Comput. Networks, 31 (1-2): 101-110 (1999)A modular methodology to verify communication protocols., and . Comput. Commun., 20 (12): 1069-1077 (1997)Game theoretic modeling of security and trust relationship in cyberspace., , and . Int. J. Commun. Syst., 29 (9): 1500-1512 (2016)