Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   14  
      Computer ScienceDistributed ComputingRoutersNetwork Security
The mobile ad hoc networks get subjected to security threats like other wireless networks. But due to their peer to peer approach and absence of infrastructural resources the mobile ad hoc networks can not use strong cryptographic... more
    • by 
    •   18  
      Mobile Ad Hoc NetworksTrustNetwork SecurityComputer Networks