ADHOCNOW   2004 International Conference on Ad-Hoc Networks and Wireless
Wall of Fame | Most Viewed ADHOCNOW-2004 Paper
13 years 11 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source190
2Download preprint from source167
3Download preprint from source163
4Download preprint from source162
5Download preprint from source162
6Download preprint from source154
7Download preprint from source154
8Download preprint from source146
9Download preprint from source128
10Download preprint from source113
11Download preprint from source113
12Download preprint from source105
13Download preprint from source103
14Download preprint from source102
15Download preprint from source95