Protection of an intrusion detection engine with watermarking in ad hoc networks

A Mitrokotsa, N Komninos… - International Journal of …, 2010 - openaccess.city.ac.uk
Mobile ad hoc networks have received great attention in recent years, mainly due to the
evolution of wireless networking and mobile computing hardware. Nevertheless, many …

[PDF][PDF] Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network.

R Kandikattu, L Jacob - Int. J. Netw. Secur., 2010 - ijns.jalaxy.com.tw
Abstract Wireless Mesh Network (WMN) is advocated as the major supporting technology for
the next generation wireless Internet satisfying the needs of anywhere-anytime broadband …

[PDF][PDF] Design Universal Security Scheme for Broadband Router.

X Gu, J Yang - Int. J. Netw. Secur., 2010 - Citeseer
Taking account of defections existed in general methods of implementing IP security (IPsec)
in broadband routers, a secure scheme based on fast path and slow path of routers was put …