Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Path Planning and Secure Routing in wireless sensor networks for Multi-Constrained Quality of Service
Published in ARPN journal of engineering and applied sciences
(18.03.2023)
Get full text
Journal Article
Improve the quality of service through secure routing networks secured in the mail
Nadhum Kadhum, Aseil
Published in International journal of engineering & technology (Dubai) (04.10.2023)
Published in International journal of engineering & technology (Dubai) (04.10.2023)
Get full text
Journal Article
New Trends in Secure Routing Protocols for Wireless Sensor Networks
El-Semary, Aly Mohamed, Abdel-Azim, Mohamed Mostafa
Published in International journal of distributed sensor networks (01.05.2013)
Published in International journal of distributed sensor networks (01.05.2013)
Get full text
Journal Article
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
Eiza, Mahmoud Hashem, Owens, Thomas, Qiang Ni
Published in IEEE transactions on dependable and secure computing (01.01.2016)
Published in IEEE transactions on dependable and secure computing (01.01.2016)
Get full text
Journal Article
Secure Routing Schema for Manet with Probabilistic Node to Node forwarding
Gowda, Sumati Ramakrishna, Hiremath, P S
Published in International journal of computer science issues (01.05.2013)
Get full text
Published in International journal of computer science issues (01.05.2013)
Journal Article
TCSR: an AIMD Trust-based Protocol for Secure Routing in VANET
Slama, Afef, Lengliz, Ilhem, Belghith, Abdelfettah
Published in 2018 International Conference on Smart Communications and Networking (SmartNets) (01.11.2018)
Published in 2018 International Conference on Smart Communications and Networking (SmartNets) (01.11.2018)
Get full text
Conference Proceeding
An AGV Mechanism Based Secure Routing Protocol for Internet of Things
Youhua Xia, Hui Lin, Li Xu
Published in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (01.10.2015)
Published in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (01.10.2015)
Get full text
Conference Proceeding
A new approach to detecting and preventing the Worm Hole attacks for secure routing in mobile ad-hoc networks based on the SPR protocol
Sharifi, Seyed Ali, Babamir, Seyed Morteza
Published in International Conference on Application of Information and Communication Technologies (01.10.2016)
Published in International Conference on Application of Information and Communication Technologies (01.10.2016)
Get full text
Conference Proceeding
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Sakharkar, Sneha M., Mangrulkar, R. S., Atique, Mohammad
Published in 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science (01.03.2014)
Published in 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science (01.03.2014)
Get full text
Conference Proceeding
An anonymous secure routing protocol for mobile ad hoc networks
Sheklabadi, E, Berenjkoub, M
Published in 2011 International Symposium on Computer Networks and Distributed Systems (01.02.2011)
Published in 2011 International Symposium on Computer Networks and Distributed Systems (01.02.2011)
Get full text
Conference Proceeding
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks
El-Semary, A. M., Azim, M. M. A.
Published in 2011 7th International Conference on Information Assurance and Security (01.12.2011)
Published in 2011 7th International Conference on Information Assurance and Security (01.12.2011)
Get full text
Conference Proceeding
A priori methods for fault tolerance in wireless sensor networks
Bellalouna, Monia, Ghabri, Afef
Published in 2013 World Congress on Computer and Information Technology (WCCIT) (01.06.2013)
Published in 2013 World Congress on Computer and Information Technology (WCCIT) (01.06.2013)
Get full text
Conference Proceeding
A countermeasure to black hole attacks in mobile ad hoc networks
Osathanunkul, K, Ning Zhang
Published in 2011 IEEE Avionics, Fiber- Optics and Photonics Technology Conference (01.04.2011)
Published in 2011 IEEE Avionics, Fiber- Optics and Photonics Technology Conference (01.04.2011)
Get full text
Conference Proceeding
Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions
Durrani, Nouman M., Kafi, Nadeem, Shamsi, Jawwad, Haider, Waleej, Abbsi, Asad M.
Published in 2013 Eighth International Conference on Digital Information Management (ICDIM) (01.09.2013)
Published in 2013 Eighth International Conference on Digital Information Management (ICDIM) (01.09.2013)
Get full text
Conference Proceeding