Login / Signup
Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process.
Sunil Kumar
Published in:
Wirel. Pers. Commun. (2022)
Keyphrases
</>
data integrity
security architecture
database design
data confidentiality
distributed databases
data security
data storage
mobile ad hoc networks
routing protocol
information security
database systems
routing algorithm
active databases
network topology
client server
business processes
intrusion detection