共 50 条
[31]
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
[J].
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II,
2009, 5593
:345-+
[32]
Research on Route Protocols of WiFi-based Ad-hoc Network
[J].
2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS),
2014,
:1154-1157
[33]
Computing of trust in ad-hoc networks
[J].
COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS,
2006, 4237
:1-11
[35]
FDAR: A load-balanced routing scheme for mobile ad-hoc networks
[J].
AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS,
2007, 4686
:186-197
[36]
Reliable Multicasting in Ad-hoc Networks - Simulated analysis of different protocols and Open Challenges
[J].
2013 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT IN THE KNOWLEDGE ECONOMY (IMKE),
2013,
:80-85
[38]
An anonymous ballot method based on bluetooth ad-hoc networks
[J].
Journal of Computational Information Systems,
2015, 11 (04)
:1223-1230
[39]
Mitigating selfishness in route discovery of on-demand routing in ad hoc networks
[J].
CHINESE JOURNAL OF ELECTRONICS,
2008, 17 (02)
:210-214
[40]
Security In Multicast Mobile Ad-Hoc Networks
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2008, 8 (07)
:326-330