2009 First International Conference on Advanced Computing 2009
DOI: 10.1109/icadvc.2009.5378230
|View full text |Cite
|
Sign up to set email alerts
|

Security in multicast mobile ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Recently, the related researches for ad hoc network are mainly focused on aspects such as the technologies of channel switching, network architecture, routing protocols, strategies for assuring Quality of Service (QoS), multicast protocols, energy conservation and security [22,25,26,27,28,29,30,31], but studies about the fault tolerance and reliability of ad hoc networks are relatively few. Tuli et al [32] proposed an asynchronous checkpointing strategy which was applied to an ad hoc network, namely MH s could take checkpoints independently.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the related researches for ad hoc network are mainly focused on aspects such as the technologies of channel switching, network architecture, routing protocols, strategies for assuring Quality of Service (QoS), multicast protocols, energy conservation and security [22,25,26,27,28,29,30,31], but studies about the fault tolerance and reliability of ad hoc networks are relatively few. Tuli et al [32] proposed an asynchronous checkpointing strategy which was applied to an ad hoc network, namely MH s could take checkpoints independently.…”
Section: Introductionmentioning
confidence: 99%