Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "secured routing"

ADD TO MY LIST
 
A Comparative study for Secure Routing in MANET

Author(s): Parul Tomar | Prof. P.K. Suri | Dr. M. K. Soni
A Secured Grid Based Route Driven PKC Scheme for Heterogeneous Sensor Network

Author(s): S.Pradheepkumar | R.Fareedha | M.Jenieferkavetha | A.Geanremona | R.Juliajoyce
Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks

Author(s): P. Samundiswary | D.Sathian | P. Dananjayan
Impact of MD5 Authentication on Routing Traffic for the Case of: EIGRP, RIPv2 and OSPF

Author(s): K. A. Al-Saud | H. M. Tahir | M. Saleh | M. Saleh
DIRECT TRUST ESTIMATED ON DEMAND PROTOCOL FOR SECURED ROUTING IN MOBILE ADHOC NETWORKS

Author(s): N.Bhalaji | Druhin mukherjee | Nabamalika banerjee | A.Shanmugam
Secured and QoS based multicast routing in MANETs

Author(s): Maya Mohan | S.Mary Saira Bhanu
SeReRoM: Secured Reliable Routing Scheme for Multicasting

Author(s): Rajavelu Srinivasan | V. Vaidehi | K. N. Srivathsan | L. Ramesh Babu | C. Karunagaran
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS

Author(s): Anil Rawat | Prakash Dattatraya Vyavahare | Ashwani Kumar Ramani
The Impact of Window’s Size in DWSIGF Routing Protocol

Author(s): Z.M. Hanapi | M. Ismail | K. Jumari | M. Mahdavi | H. Mirvaziri
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery

Author(s): V.Ramesh | P.Subbaiah | N.Sandeep Chaitanya | P. Bhaktavastalam
Potential Security Attacks on Wireless Networks and their Countermeasure

Author(s): Sreedhar. C | S. Madhusudhana Verma | N. Kasiviswanath
Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

Author(s): Rakesh Kumar | Dr. Piush Verma | Dr. Yaduvir Singh
A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

Author(s): Anupriya Sharma | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)

Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

Author(s): Mohamed Hamdy Eldefrawy | Muhammad Khurram Khan | Khaled Alghathbar | Ahmed Saleh Tolba | Kyngn Jung Kim
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
Secured Approach to Routing in Mobile Ad Hoc Networks

Author(s): Rajdeep Singh | Vaishali Gupta
Security Conformance for the Dynamically Routed Data

Author(s): Suma Patra | Dr.V.Janaki | Priyanka suram | Nalubala Ranjeeth Kumar
A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network

Author(s): Himadri Nath Saha | Debika Bhattacharyya | P.K. Banerjee
An Enhanced Secured Dynamic Source Routing Protocol for MANETS

Author(s): G.Lavanya | A. Ebenezer Jeyakumar
Making Ad Hoc Network Stable, Secured and Energy Efficient

Author(s): Divya Sharma | Ashwani Kush
A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

Author(s): Edna E. Nallathambi | Radha Sankararajan | Vaithiyanathan Sundaram | Gracelin Sheeba
Why do you need a reservation system?      Save time & money - Smart Internet Solutions