Computer Science ›› 2008, Vol. 35 ›› Issue (8): 21-25.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Ad Hoc networks are vulnerable to some kinds of attacks for its network structure characteristics, this makes the secure routing and data transmission be research hotspots of Ad Hoc applications. As to the External attacks, some efficient and secure schem

Key words: Ad Hoc network,Secure data transmission, Intrusion detection, Malicious behavior judgment

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!