Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks

GM Borkar - International Journal of Communication …, 2018 - inderscienceonline.com
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …

Security Aware Dual Authentication based Routing Scheme using Fuzzy Logic with Secure data Dissemination for Mobile Ad-hoc Networks

GM Borkar, AR Mahajan - Journal of Applied Security …, 2018 - ingentaconnect.com
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …

Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2018 - inderscience.com
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …

Security Aware Dual Authentication based Routing Scheme using Fuzzy Logic with Secure data Dissemination for Mobile Ad-hoc Networks

GM Borkar, AR Mahajan - Journal of Applied Security Research, 2018 - Taylor & Francis
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …

Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2018 - inderscience.com
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …