Sciweavers

Share
ITCC   2005 International Conference on Information Technology: Coding and Computing
Wall of Fame | Most Viewed ITCC-2005 Paper
ITCC
2005
IEEE
9 years 3 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source255
2Download preprint from source234
3Download preprint from source229
4Download preprint from source218
5Download preprint from source214
6Download preprint from source209
7Download preprint from source177
8Download preprint from source176
9Download preprint from source174
10Download preprint from source172
11Download preprint from source171
12Download preprint from source169
13Download preprint from source166
14Download preprint from source166
15Download preprint from source163
16Download preprint from source161
17Download preprint from source159
18Download preprint from source155
19Download preprint from source155
20Download preprint from source154
21Download preprint from source153
22Download preprint from source153
23Download preprint from source153
24Download preprint from source151
25Download preprint from source151
26Download preprint from source149
27Download preprint from source149
28Download preprint from source148
29Download preprint from source145
30Download preprint from source144
31Download preprint from source142
32Download preprint from source141
33Download preprint from source139
34Download preprint from source139
35Download preprint from source139
36Download preprint from source139
37Download preprint from source139
38Download preprint from source137
39Download preprint from source136
40Download preprint from source136
41Download preprint from source130
42Download preprint from source129
43Download preprint from source127
44Download preprint from source126
45Download preprint from source125
46Download preprint from source123
47Download preprint from source123
48Download preprint from source121
49Download preprint from source121
50Download preprint from source121
51Download preprint from source120
52Download preprint from source120
53Download preprint from source119
54Download preprint from source118
55Download preprint from source117
56Download preprint from source117
57Download preprint from source117
58Download preprint from source117
59Download preprint from source116
60Download preprint from source115
61Download preprint from source114
62Download preprint from source114
63Download preprint from source112
64Download preprint from source112
65Download preprint from source111
66Download preprint from source110
67Download preprint from source110
68Download preprint from source108
69Download preprint from source107
70Download preprint from source105
71Download preprint from source105
72Download preprint from source104
73Download preprint from source102
74Download preprint from source102
75Download preprint from source99
76Download preprint from source99
77Download preprint from source97
78Download preprint from source95
79Download preprint from source94
80Download preprint from source94
81Download preprint from source91
82Download preprint from source90
83Download preprint from source87
books