Results 261 to 264 of about 1,387,366 (264)
Some of the next articles are maybe not open access.
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys, 2007exaly
Position-Based Ad Hoc Routes in Ad Hoc Networks
2002Silvia Giordano, Ivan Stojmenovic
openaire +1 more source

