Skip to content
VuFind
Advanced
  • STCM: Secured trust-based comm...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
QR Code

STCM: Secured trust-based communication method in vulnerable mobile adhoc network

Mobile Adhoc network is shrouded with various issues where majority of the problems encircle around routing and security issues. The root cause of such unsolved issues is dynamic topology and decentralized architecture. A closer look into the existing literatures shows that cryptography is the frequ...

Full description

Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Baba, Asifa Mehraj, Zulkurnain, Nurul Fariza, Lone, Sajad Ahmad
Format: Proceeding Paper
Language:English
English
English
Published: Springer 2017
Subjects:
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Online Access:http://irep.iium.edu.my/57640/
http://irep.iium.edu.my/57640/1/57640_STCM-%20Secured%20Trust-Based%20Communication.pdf
http://irep.iium.edu.my/57640/2/57640_STCM-%20Secured%20Trust-Based%20Communication_SCOPUS.pdf
http://irep.iium.edu.my/57640/13/57640%20STCM%20-%20Secured%20trust-based%20communication%20WOS.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/57640/
http://irep.iium.edu.my/57640/1/57640_STCM-%20Secured%20Trust-Based%20Communication.pdf
http://irep.iium.edu.my/57640/2/57640_STCM-%20Secured%20Trust-Based%20Communication_SCOPUS.pdf
http://irep.iium.edu.my/57640/13/57640%20STCM%20-%20Secured%20trust-based%20communication%20WOS.pdf

Similar Items

  • STCM: secured trust-based communication method in vulnerable mobile adhoc network
    by: Khan, Burhan ul Islam, et al.
    Published: (2016)
  • JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
    by: Khan, Burhan Ul Islam, et al.
    Published: (2017)
  • A study on performance evaluation of conventional cache replacement algorithms: A review
    by: Olanrewaju, Rashidah Funke, et al.
    Published: (2017)
  • Efficient cache replacement policy for minimizing error rate in L2-STT-MRAM caches
    by: Olanrewaju, Rashidah Funke, et al.
    Published: (2018)
  • An application of biometric technology : Iris recognition
    by: Khalifa, Othman Omran, et al.
    Published: (2011)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips