Login / Signup
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions.
Norihito Yosaka
Iichiro Nishimura
Tomoyuki Nagase
Published in:
NBiS (2011)
Keyphrases
</>
ad hoc networks
wireless ad hoc networks
wireless networks
intrusion detection
quality of service
routing protocol
end to end
routing algorithm
network topology
mac protocol
peer to peer
intrusion detection system
multi hop