×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [malicious node]
Securing Underwater wireless communication networks Report
785 views
Implementing Grid Security Concepts EU FP6 Projects AssessGrid & GridTrust Syed Naqvi
[email protected]
07 September 2007, Budapest - Hungary
214 views
Tempering Kademlia with a Robust Identity-based System Luca Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella Giancarlo Ruffo SecNet Group
221 views
Embedding identity in DHT systems: security, reputation and social networking management 1 Embedding Identity in DHT Systems: Security, Reputation and
223 views
Secure routing and data transmission in mobile
433 views
AODV and DSR Routing Protocols Under Wormhole Attack Environment
107 views
Security Issues in MANET
380 views
On the use of radio resource tests in wireless ad hoc networks
165 views
Wsn security issues
91 views
Wsn security issues
64 views
IRJET-Performance Evaluation of Black Hole Attack and Prevention Using AODV on MANET
234 views
Securing Wireless Sensor Network (WSN) With DNA
220 views
Next >