Sign in

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.

Yongkai ZhouZhi XueChong FuJianhua LiYue WuYi YuanYun ZhuYong Shi
Published in: CSE (2013)
Keyphrases
  • wireless ad hoc networks
  • end to end
  • operating system
  • wireless networks
  • ad hoc networks
  • trust model
  • trust relationships
  • load balancing