IJACSA - International Journal of Advanced Computer Science and Applications
number
5
volume
2
file
:F$\backslash$:/The\_Sai\_New/The\_Sai\_New/Downloads/Volume2No5/Paper 1-Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks.pdf:pdf
Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 Om2011
%A Om, Shree
%D 2011
%J IJACSA - International Journal of Advanced Computer Science and Applications
%K - against attack attack,gives background black-hole challenges,aodv,cooperative gives on statement,section the the,malicious,manet,merkle the,section tree,owhf,problem v vi,works wmn,and
%N 5
%T Using Merkle Tree to Mitigate Cooperative Black- hole Attack in Wireless Mesh Networks
%U http://ijacsa.thesai.org
%V 2
@article{Om2011,
added-at = {2011-06-18T20:19:46.000+0200},
author = {Om, Shree},
biburl = {https://www.bibsonomy.org/bibtex/2bf854a54e89d797215d6c03ad809df96/editorijacsa},
file = {:F$\backslash$:/The\_Sai\_New/The\_Sai\_New/Downloads/Volume2No5/Paper 1-Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks.pdf:pdf},
interhash = {e362802290274cdbe0ec87103b2770db},
intrahash = {bf854a54e89d797215d6c03ad809df96},
journal = {IJACSA - International Journal of Advanced Computer Science and Applications},
keywords = {- against attack attack,gives background black-hole challenges,aodv,cooperative gives on statement,section the the,malicious,manet,merkle the,section tree,owhf,problem v vi,works wmn,and},
number = 5,
timestamp = {2011-06-20T09:00:35.000+0200},
title = {{Using Merkle Tree to Mitigate Cooperative Black- hole Attack in Wireless Mesh Networks}},
url = {http://ijacsa.thesai.org},
volume = 2,
year = 2011
}