PE   2006 Performance Engineering
Wall of Fame | Most Viewed PE-2006 Paper
193views Optimization» more  PE 2006»
13 years 2 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source193
2Download preprint from source158
3Download preprint from source145
4Download preprint from source130
5Download preprint from source130
6Download preprint from source127
7Download preprint from source127
8Download preprint from source125
9Download preprint from source124
10Download preprint from source115
11Download preprint from source114
12Download preprint from source111
13Download preprint from source109
14Download preprint from source109
15Download preprint from source107
16Download preprint from source103
17Download preprint from source95
18Download preprint from source91
19Download preprint from source85
20Download preprint from source80
21Download preprint from source79