STCM: secured trust-based communication method in vulnerable mobile adhoc network
t Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the fre...
| Main Authors: | Khan, Burhan ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Springer Singapore
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/27533/ http://irep.iium.edu.my/27533/13/27533_Conference_complete.pdf http://irep.iium.edu.my/27533/14/27533_Conference_SCOPUS.pdf |
Similar Items
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
A study on performance evaluation of conventional cache replacement algorithms: A review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Frequent itemset mining in high dimensional data: a review
by: Md. Zaki, Fatimah Audah, et al.
Published: (2019)
by: Md. Zaki, Fatimah Audah, et al.
Published: (2019)
Real time telemedical health care systems with wearable sensors
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
by: Fajingbesi, Fawwaz Eniola, et al.
Published: (2017)
An evaluation of transform domain watermarking and its application to intellectual properties images
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Design and implementation of a five stage pipelining architecture simulator for RiSC-16 instruction set
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Evaluation and analysis of an enhanced hybrid wireless mesh protocol for vehicular adhoc network
by: Eltahir, Amal A., et al.
Published: (2016)
by: Eltahir, Amal A., et al.
Published: (2016)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Bringing order in segments for a robust network in mobile services
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
by: Muhyiddeen, Abdulfattah, et al.
Published: (2015)
Adaptive interval type-2 fuzzy logic controller for autonomous mobile robot
by: Shill, P.C., et al.
Published: (2014)
by: Shill, P.C., et al.
Published: (2014)
Particle swarm optimization with partial search for solving traveling salesman problem
by: Akhand, M. A. H, et al.
Published: (2014)
by: Akhand, M. A. H, et al.
Published: (2014)
The proposal of partial sharing for link-sharing method of buffer in NoC router
by: Fukase, Naohisa, et al.
Published: (2014)
by: Fukase, Naohisa, et al.
Published: (2014)
Effects of high neutron fluence on the electrical characteristics of InAs quantum dot structures
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
3MeV-electron beam induced threshold voltage shifts and drain current degradation on ZVN3320FTA & ZVP3310FTA commercial MOSFETs
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
Design and optimization of alLow-voltage shunt capacitive RF-MEMS switch
by: Ma, Li Ya, et al.
Published: (2014)
by: Ma, Li Ya, et al.
Published: (2014)
Design and analysis of a low-voltage electrostatic
actuated RF CMOS-MEMS switch
by: Ma, Li Ya, et al.
Published: (2013)
by: Ma, Li Ya, et al.
Published: (2013)
Equivalent circuit modeling of two-port Al-doped Zinc Oxide CMOS SAW resonator using MATLABâ„¢
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Comparative analysis of zinc oxide and aluminium doped ZnO for GHz CMOS MEMS surface acoustic wave resonator
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Finite element modeling of SAW resonator in CMOS technology for single and double interdigitated electrode (IDT) structure
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2013)
Cytotoxicity studies of lung cancer cells using impedance biosensor
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2015)
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2015)
Screen printed impedance biosensor for cytotoxicity studies of lung carcinoma cells
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2016)
by: Mohd Mansor, Ahmad Fairuzabadi, et al.
Published: (2016)
Design and simulation of 10 MHz MEMS oscillator
by: Taufik, Mohamad Syamsi, et al.
Published: (2014)
by: Taufik, Mohamad Syamsi, et al.
Published: (2014)
Piezoelectric thin films for double electrode CMOS MEMS surface acoustic wave (SAW) resonator
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2015)
by: Md Ralib @ Md Raghib, Aliza 'Aini, et al.
Published: (2015)
Design and simulation of RF-CMOS SPST switch for reconfigurable RF front-end
by: Soeroso, Iksannurazmi Bambang, et al.
Published: (2014)
by: Soeroso, Iksannurazmi Bambang, et al.
Published: (2014)
Bioimpedance spectroscopy system for characterization of cancer cells
by: Al-hashimi, Ahmad, et al.
Published: (2014)
by: Al-hashimi, Ahmad, et al.
Published: (2014)
Toxicity studies using mammalian cells and impedance spectroscopy method
by: Xudong, Zhang, et al.
Published: (2015)
by: Xudong, Zhang, et al.
Published: (2015)
Internet-based troubleshooting and monitoring system of industrial robots
by: Rahman, Md. Mozasser, et al.
Published: (2015)
by: Rahman, Md. Mozasser, et al.
Published: (2015)
Channel length effect on the saturation current and the threshold voltages of CNTFET
by: Ani, Mohd Hanafi, et al.
Published: (2014)
by: Ani, Mohd Hanafi, et al.
Published: (2014)
Electronic state transition in cooperatively interacting
point-defects in semiconductor crystals
by: Mohamed, Mohd Ambri, et al.
Published: (2014)
by: Mohamed, Mohd Ambri, et al.
Published: (2014)
Thulium bismuth co-doped fiber lasers at 1901 nm by 802 nm pumping
by: Halder, Arindam, et al.
Published: (2014)
by: Halder, Arindam, et al.
Published: (2014)
Similar Items
-
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
A study on performance evaluation of conventional cache replacement algorithms: A review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018) -
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)