Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks

None

Saved in:
Bibliographic Details
Main Author: Alotaibi, Saud Rugeish
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2011
Subjects:
Online Access:https://www.intechopen.com/chapters/12869
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1839561195312381952
author Alotaibi, Saud Rugeish
author_facet Alotaibi, Saud Rugeish
author_sort Alotaibi, Saud Rugeish
collection InTech Open eBooks
description None
doi_str_mv 10.5772/12924
first_indexed 2025-08-04T21:17:45Z
format Electronic
Book Chapter
fullrecord <oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><identifier>InTech-12869</identifier><datestamp>2011-01-30</datestamp> <dc:title>Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks</dc:title> <dc:creator>Saud Rugeish Alotaibi</dc:creator> <dc:subject>Physical Sciences, Engineering and Technology</dc:subject> <dc:description>None</dc:description> <dc:publisher>IntechOpen</dc:publisher> <dc:date>2011-01-30</dc:date> <dc:type>Chapter, Part Of Book</dc:type> <dc:identifier>https://www.intechopen.com/chapters/12869</dc:identifier> <dc:identifier>doi:10.5772/12924</dc:identifier> <dc:language>en</dc:language> <dc:relation>ISBN:978-953-307-402-3</dc:relation> <dc:rights>https://creativecommons.org/licenses/by-nc-sa/3.0/</dc:rights> <dc:source>https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design</dc:source> </oai_dc:dc>
id InTech-12869
institution Matheson Library
isbn 978-953-307-402-3
language English
last_indexed 2025-08-04T21:17:45Z
publishDate 2011
publisher IntechOpen
record_format intech
spelling InTech-128692011-01-30 Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks Saud Rugeish Alotaibi Physical Sciences, Engineering and Technology None IntechOpen 2011-01-30 Chapter, Part Of Book https://www.intechopen.com/chapters/12869 doi:10.5772/12924 en ISBN:978-953-307-402-3 https://creativecommons.org/licenses/by-nc-sa/3.0/ https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design
spellingShingle Physical Sciences, Engineering and Technology
Alotaibi, Saud Rugeish
Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_full Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_fullStr Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_full_unstemmed Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_short Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_sort security of access in hostile environments based on the history of nodes in ad hoc networks
topic Physical Sciences, Engineering and Technology
url https://www.intechopen.com/chapters/12869
work_keys_str_mv AT alotaibisaudrugeish securityofaccessinhostileenvironmentsbasedonthehistoryofnodesinadhocnetworks