2017
DOI: 10.1504/ijmndi.2017.085743
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of on-demand routing protocol for MANET using EA3ACK algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In terms of the security that it affords (which can be either practical or theoretical), he discussed both Shannon's theory of theoretical secrecy as well as Simmon's theory of theoretical authenticity. Lastly, Schneier [11] concluded that secrecy of security as a good thing is a myth and that it is not good for security to be secret, as security completely relying on secrecy can be fragile. If that secrecy was lost, regaining it would be impossible.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of the security that it affords (which can be either practical or theoretical), he discussed both Shannon's theory of theoretical secrecy as well as Simmon's theory of theoretical authenticity. Lastly, Schneier [11] concluded that secrecy of security as a good thing is a myth and that it is not good for security to be secret, as security completely relying on secrecy can be fragile. If that secrecy was lost, regaining it would be impossible.…”
Section: Literature Surveymentioning
confidence: 99%
“…The only reliable way to make more improvements in security is to embrace public scrutiny. Varol, N. et al [12] studied on symmetric encryption which is used for the encryption of a certain text or speech. In this study the content to be encrypted is first converted into an encapsulation cipher that cannot be understood by a cipher algorithm.…”
Section: Literature Surveymentioning
confidence: 99%