Login / Signup
An effective implementation of security based algorithmic approach in mobile adhoc networks.
Rajinder Singh
Parvinder Singh
Manoj Duhan
Published in:
Hum. centric Comput. Inf. Sci. (2014)
Keyphrases
</>
real time
mobile devices
intrusion detection
information security
mobile phone
access control
network security
security requirements
mobile commerce
data sets
low cost
computer systems
mobile applications
hardware implementation
smart phones
mobile computing