Protection against Mobile Adversaries in Mobile Ad-hoc Networks.
Ronghua ShiYanhua YanPublished in: ICYCS (2008)
Keyphrases
- mobile devices
- mobile wireless
- mobile phone
- mobile nodes
- mobile learning
- sensor networks
- mobile communication
- context aware
- mobile applications
- mobile users
- mobile technologies
- data sets
- database transactions
- bounded rationality
- mobile commerce
- mobile networks
- mobile computing
- end to end
- wireless networks
- wireless sensor networks
- response time