Login / Signup

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks.

Hany SamuelWeihua Zhuang
Published in: J. Commun. (2010)
Keyphrases
  • end to end
  • multipath
  • intrusion detection
  • ad hoc networks
  • network security
  • wifi
  • data transmission
  • real time
  • wireless networks
  • resource management
  • security policies
  • network management
  • multi hop