Login / Signup
A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks.
Firoz Ahmed
Seokhoon Yoon
Hoon Oh
Published in:
IEICE Trans. Commun. (2015)
Keyphrases
</>
black hole
cooperative
mobile agents
black hole attack
model checking
java card
network topologies
cryptographic protocols