Academic literature on the topic 'Secure Routing with Localized Key Management Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Routing with Localized Key Management Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Routing with Localized Key Management Protocol"
Jayaprakash, R., and B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.
Full textRathee, Geetanjali, and Hemraj Saini. "Secure Buffer-Based Routing Protocol for WMN." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 28–44. http://dx.doi.org/10.4018/ijbdcn.2017010103.
Full textYu, Zhe Fu, Hai Gang Zhou, and Zhao Feng Wu. "A Secure Routing Protocol Based on Certificateless Signcryption for Satellite Networks." Advanced Materials Research 546-547 (July 2012): 1065–70. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1065.
Full textKaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks." Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.
Full textK.R, Shibu, and Suji Pramila R. "Routing protocol based key management schemes in manet: a survey." International Journal of Engineering & Technology 7, no. 3 (July 11, 2018): 1453. http://dx.doi.org/10.14419/ijet.v7i3.14219.
Full textFernandes, Natalia Castro, and Otto Carlos Muniz Bandeira Duarte. "A lightweight group-key management protocol for secure ad-hoc-network routing." Computer Networks 55, no. 3 (February 2011): 759–78. http://dx.doi.org/10.1016/j.comnet.2010.10.003.
Full textBondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (January 20, 2022): 1041. http://dx.doi.org/10.3390/app12031041.
Full textKamboj, Nippun, Dalip, and Munishwar Rai. "A New Secure Ad-Hoc on Demand Distance Vector Routing Protocol to Ensure Less Power Consumption in Mobile Ad-Hoc Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2483–87. http://dx.doi.org/10.1166/jctn.2020.8919.
Full textLIN, H. Y. "Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks." IEICE Transactions on Communications E88-B, no. 9 (September 1, 2005): 3598–613. http://dx.doi.org/10.1093/ietcom/e88-b.9.3598.
Full textIqbal, J. L. Mazher, and G. L. Anil. "Secure Energy Efficient Network Priority Routing Protocol for Effective Data Collection and Key Management in Dynamic WSNs." International Journal of Information and Computer Security 13, no. 2 (2020): 1. http://dx.doi.org/10.1504/ijics.2020.10023138.
Full textDissertations / Theses on the topic "Secure Routing with Localized Key Management Protocol"
Talawar, Shrikant. "Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks." Thesis, 2015. https://etd.iisc.ac.in/handle/2005/4545.
Full textBook chapters on the topic "Secure Routing with Localized Key Management Protocol"
Kim, Jinsu, Seongyong Choi, Seungjin Han, Junhyeog Choi, Junghyun Lee, and Keewook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol." In Future Generation Information Technology, 181–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10509-8_21.
Full textConference papers on the topic "Secure Routing with Localized Key Management Protocol"
Talawar, Shrikant H., Soumyadev Maity, and R. C. Hansdah. "Secure Routing with an Integrated Localized Key Management Protocol in MANETs." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.74.
Full textKim, Jin-Su, Hyung-Seok Joo, Jung-Hyun Lee, and Kee-Wook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol." In 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccit.2009.109.
Full textZhang, Kun, Cong Wang, and Cuirong Wang. "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.889.
Full text