Academic literature on the topic 'Trust enhanced security architecture for the MANET'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust enhanced security architecture for the MANET.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trust enhanced security architecture for the MANET"
Yamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (October 31, 2022): 757–65. http://dx.doi.org/10.18280/isi.270508.
Full textFilipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.
Full textLin, Ching, and Vijay Varadharajan. "MobileTrust: a trust enhanced security architecture for mobile agent systems." International Journal of Information Security 9, no. 3 (December 11, 2009): 153–78. http://dx.doi.org/10.1007/s10207-009-0098-x.
Full textKumar, R. Sathish, A. Akthar unissa, S. Koperundevi, and S. Suganthi. "Enhanced Trust Based Architecture in MANET using AODV Protocol to Eliminate Packet Dropping Attacks." International Journal of Engineering Trends and Technology 34, no. 1 (April 25, 2016): 21–27. http://dx.doi.org/10.14445/22315381/ijett-v34p204.
Full textMusthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.
Full textBegum, Shifana, Megha M. Gamskar, and Prakrithi Mogasale. "Security of Data with Enhanced Technique of AASR Protocol for Secure Crosslayer Routing in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (May 30, 2020): 17–21. http://dx.doi.org/10.46501/ijmtst060605.
Full textMaheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Full textNagarajan, Aarthi, and Vijay Varadharajan. "Dynamic trust enhanced security model for trusted platform based services." Future Generation Computer Systems 27, no. 5 (May 2011): 564–73. http://dx.doi.org/10.1016/j.future.2010.10.008.
Full textDevi, Vallala Sowmya, and Nagaratna P. Hegde. "Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer." Wireless Personal Communications 100, no. 3 (February 8, 2018): 923–40. http://dx.doi.org/10.1007/s11277-018-5358-5.
Full textMao, Ming, Peng Yi, Tao Hu, Zhen Zhang, Xiangyu Lu, and Jingwei Lei. "Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs." Mobile Information Systems 2021 (August 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/7611619.
Full textDissertations / Theses on the topic "Trust enhanced security architecture for the MANET"
Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.
Full textBook chapters on the topic "Trust enhanced security architecture for the MANET"
Garg, Roopali. "MANET." In Advances in Wireless Technologies and Telecommunication, 444–76. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch014.
Full textCiszkowski, Tomasz, and Zbigniew Kotulski. "Secure Routing with Reputation in MANET." In Handbook of Research on Wireless Security, 449–60. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch028.
Full textSarbhukan, Vaishali Vilas, and Lata Ragha. "Mobile Ad Hoc Networks Security Enhancement With Trust Management." In Managing Resources for Futuristic Wireless Networks, 1–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-5225-9493-2.ch001.
Full textAllison, David S., Hany F. EL Yamany, and Miriam A. M. Capretz. "A Privacy Service for Comparison of Privacy and Trust Policies within SOA." In Threats, Countermeasures, and Advances in Applied Information Security, 248–65. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch013.
Full textLiampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Cyber Law, Privacy, and Security, 157–87. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch009.
Full textMitrakas, Andreas. "Certificate Management Interoperability for E-Government Applications." In Secure E-Government Web Services, 143–61. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-138-4.ch009.
Full textLiampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Censorship, Surveillance, and Privacy, 536–66. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7113-1.ch029.
Full textLiampotis, Nicolas, Eliza Papadopoulou, Nikos Kalatzis, Ioanna G. Roussaki, Pavlos Kosmides, Efstathios D. Sykas, Diana Bental, and Nicholas Kenelm Taylor. "Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments." In Advances in Wireless Technologies and Telecommunication, 410–39. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8732-5.ch016.
Full textConference papers on the topic "Trust enhanced security architecture for the MANET"
Tupakula, Udaya, and Vijay Varadharajan. "Trust Enhanced Security Architecture for Detecting Insider Threats." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.8.
Full textBalakrishnan, Venkat, Vijay Varadharajan, Uday Tupakula, and Phillip Lucs. "TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks." In 2007 15th IEEE International Conference on Networks. IEEE, 2007. http://dx.doi.org/10.1109/icon.2007.4444083.
Full textMcGibney, Jimmy, and Dmitri Botvich. "A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam." In The Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.28.
Full textIordache, Catalin Adrian, Adrian Viorel Dragomir, and Constantin Viorel Marian. "Public Institutions Updated Enhanced Biometric Security, Zero Trust Architecture and Multi-Factor Authentification." In 2022 International Symposium on Electronics and Telecommunications (ISETC). IEEE, 2022. http://dx.doi.org/10.1109/isetc56213.2022.10010127.
Full textKrishna, Aarthi, Vijay Varadharajan, and Nathan Tarr. "On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2013. http://dx.doi.org/10.1109/trustcom.2013.246.
Full text