A Alomari - Journal of Information Systems & Operations …, 2013 - go.gale.com
Mobile wireless ad hoc networks that are resistant to impersonating nodes are necessary for
distributed systems used in security applications. Many secure protocols in mobile ad hoc …