Last update: Sun Jan 21 02:03:58 MST 2018
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Matam:2012:DAW,
author = "Rakesh Matam and Somanath Tripathy",
title = "Defence against Wormhole Attacks in Wireless Mesh
Networks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7671",
pages = "181--193",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-35130-3_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:18:37 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-35130-3_13/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-35130-3",
book-URL = "http://www.springerlink.com/content/978-3-642-35130-3",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- against,
7658(0)98,
7658(0)262,
7668(0)80,
7690(0)1,
7690(0)285
- Attack,
7658(0)226,
7658(0)262,
7668(0)156,
7668(0)172,
7668(0)191,
7668(0)244,
7668(0)265,
7672(0)139,
7679(0)7,
7690(0)15,
7690(0)270,
7690(0)285
- Network,
7654(0)109,
7654(0)142,
7659(0)148,
7659(0)159,
7659(0)188,
7659(0)219,
7661(0)21,
7661(0)115,
7663(0)1,
7663(0)33,
7664(0)25,
7664(0)117,
7665(0)1,
7665(0)50,
7665(0)68,
7665(0)133,
7666(0)1,
7666(0)18,
7666(0)52,
7666(0)91,
7666(0)100,
7666(0)123,
7666(0)156,
7667(0)1,
7667(0)25,
7667(0)100,
7667(0)151,
7670(0)119,
7671(0)119,
7671(0)164,
7671(0)194,
7673(0)62,
7675(0)150,
7677(0)98,
7677(0)124,
7683(0)177
- Wireless,
7659(0)188