Search
Now showing items 1-10 of 94
Retrospection and comparison of Dsdv and Aomdv routing protocols in Manet using Ns-2
Publisher: IEEE
Year: 2014
Revisiting the Blom key management scheme
Publisher: IEEE
Year: 2014
Cloud computing: Security threats & control strategy using tri-mechanism
Publisher: IEEE
Year: 2014
Quantitative Verification in Rational Environments
Publisher: IEEE
Year: 2014
Intelligent traffic obstruction control and supervision system in VANET
Publisher: IEEE
Year: 2014