Login / Signup
Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks.
Hany Samuel
Weihua Zhuang
Published in:
J. Commun. (2010)
Keyphrases
</>
end to end
multipath
intrusion detection
ad hoc networks
network security
wifi
data transmission
real time
wireless networks
resource management
security policies
network management
multi hop