Authentication based and optimized routing technique in mobile ad hoc networks.(Report): An article from: Journal of Computer Science
Book Details
PublisherScience Publications
ISBN / ASINB005FUI480
ISBN-13978B005FUI489
AvailabilityAvailable for download now
MarketplaceUnited States 🇺🇸
Description
This digital document is an article from Journal of Computer Science, published by Science Publications on May 1, 2011. The length of the article is 3616 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.
From the author: Key words: Double Hash Authentication Technique (DHT), ad hoc network, Dynamic Source Routing (DSR), SHORT, Source Address (SA), Destination Address (DA), Neighbor Node Address (NA), malicious node, routing protocols, network topology
Citation Details
Title: Authentication based and optimized routing technique in mobile ad hoc networks.(Report)
Author: S. Varadhaganapathy
Publication:Journal of Computer Science (Magazine/Journal)
Date: May 1, 2011
Publisher: Science Publications
Volume: 7 Issue: 5 Page: 651(6)
Article Type: Report
Distributed by Gale, a part of Cengage Learning
From the author: Key words: Double Hash Authentication Technique (DHT), ad hoc network, Dynamic Source Routing (DSR), SHORT, Source Address (SA), Destination Address (DA), Neighbor Node Address (NA), malicious node, routing protocols, network topology
Citation Details
Title: Authentication based and optimized routing technique in mobile ad hoc networks.(Report)
Author: S. Varadhaganapathy
Publication:Journal of Computer Science (Magazine/Journal)
Date: May 1, 2011
Publisher: Science Publications
Volume: 7 Issue: 5 Page: 651(6)
Article Type: Report
Distributed by Gale, a part of Cengage Learning
