Literatura académica sobre el tema "Secure Routing with Localized Key Management Protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure Routing with Localized Key Management Protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure Routing with Localized Key Management Protocol"
Jayaprakash, R. y B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network". Journal of Computational and Theoretical Nanoscience 17, n.º 12 (1 de diciembre de 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.
Texto completoRathee, Geetanjali y Hemraj Saini. "Secure Buffer-Based Routing Protocol for WMN". International Journal of Business Data Communications and Networking 13, n.º 1 (enero de 2017): 28–44. http://dx.doi.org/10.4018/ijbdcn.2017010103.
Texto completoYu, Zhe Fu, Hai Gang Zhou y Zhao Feng Wu. "A Secure Routing Protocol Based on Certificateless Signcryption for Satellite Networks". Advanced Materials Research 546-547 (julio de 2012): 1065–70. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1065.
Texto completoKaur, Jugminder, Sandeep S. Gill y Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks". Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.
Texto completoK.R, Shibu y Suji Pramila R. "Routing protocol based key management schemes in manet: a survey". International Journal of Engineering & Technology 7, n.º 3 (11 de julio de 2018): 1453. http://dx.doi.org/10.14419/ijet.v7i3.14219.
Texto completoFernandes, Natalia Castro y Otto Carlos Muniz Bandeira Duarte. "A lightweight group-key management protocol for secure ad-hoc-network routing". Computer Networks 55, n.º 3 (febrero de 2011): 759–78. http://dx.doi.org/10.1016/j.comnet.2010.10.003.
Texto completoBondada, Praveen, Debabrata Samanta, Manjit Kaur y Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism". Applied Sciences 12, n.º 3 (20 de enero de 2022): 1041. http://dx.doi.org/10.3390/app12031041.
Texto completoKamboj, Nippun, Dalip y Munishwar Rai. "A New Secure Ad-Hoc on Demand Distance Vector Routing Protocol to Ensure Less Power Consumption in Mobile Ad-Hoc Network". Journal of Computational and Theoretical Nanoscience 17, n.º 6 (1 de junio de 2020): 2483–87. http://dx.doi.org/10.1166/jctn.2020.8919.
Texto completoLIN, H. Y. "Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks". IEICE Transactions on Communications E88-B, n.º 9 (1 de septiembre de 2005): 3598–613. http://dx.doi.org/10.1093/ietcom/e88-b.9.3598.
Texto completoIqbal, J. L. Mazher y G. L. Anil. "Secure Energy Efficient Network Priority Routing Protocol for Effective Data Collection and Key Management in Dynamic WSNs". International Journal of Information and Computer Security 13, n.º 2 (2020): 1. http://dx.doi.org/10.1504/ijics.2020.10023138.
Texto completoTesis sobre el tema "Secure Routing with Localized Key Management Protocol"
Talawar, Shrikant. "Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks". Thesis, 2015. https://etd.iisc.ac.in/handle/2005/4545.
Texto completoCapítulos de libros sobre el tema "Secure Routing with Localized Key Management Protocol"
Kim, Jinsu, Seongyong Choi, Seungjin Han, Junhyeog Choi, Junghyun Lee y Keewook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol". En Future Generation Information Technology, 181–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10509-8_21.
Texto completoActas de conferencias sobre el tema "Secure Routing with Localized Key Management Protocol"
Talawar, Shrikant H., Soumyadev Maity y R. C. Hansdah. "Secure Routing with an Integrated Localized Key Management Protocol in MANETs". En 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.74.
Texto completoKim, Jin-Su, Hyung-Seok Joo, Jung-Hyun Lee y Kee-Wook Rim. "Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol". En 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccit.2009.109.
Texto completoZhang, Kun, Cong Wang y Cuirong Wang. "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management". En 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.889.
Texto completo