Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
None
Saved in:
| Main Author: | |
|---|---|
| Format: | Electronic Book Chapter |
| Language: | English |
| Published: |
IntechOpen
2011
|
| Subjects: | |
| Online Access: | https://www.intechopen.com/chapters/12869 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1839561195312381952 |
|---|---|
| author | Alotaibi, Saud Rugeish |
| author_facet | Alotaibi, Saud Rugeish |
| author_sort | Alotaibi, Saud Rugeish |
| collection | InTech Open eBooks |
| description | None |
| doi_str_mv | 10.5772/12924 |
| first_indexed | 2025-08-04T21:17:45Z |
| format | Electronic Book Chapter |
| fullrecord | <oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><identifier>InTech-12869</identifier><datestamp>2011-01-30</datestamp>
<dc:title>Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks</dc:title>
<dc:creator>Saud Rugeish Alotaibi</dc:creator>
<dc:subject>Physical Sciences, Engineering and Technology</dc:subject>
<dc:description>None</dc:description>
<dc:publisher>IntechOpen</dc:publisher>
<dc:date>2011-01-30</dc:date>
<dc:type>Chapter, Part Of Book</dc:type>
<dc:identifier>https://www.intechopen.com/chapters/12869</dc:identifier>
<dc:identifier>doi:10.5772/12924</dc:identifier>
<dc:language>en</dc:language>
<dc:relation>ISBN:978-953-307-402-3</dc:relation>
<dc:rights>https://creativecommons.org/licenses/by-nc-sa/3.0/</dc:rights>
<dc:source>https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design</dc:source>
</oai_dc:dc> |
| id | InTech-12869 |
| institution | Matheson Library |
| isbn | 978-953-307-402-3 |
| language | English |
| last_indexed | 2025-08-04T21:17:45Z |
| publishDate | 2011 |
| publisher | IntechOpen |
| record_format | intech |
| spelling | InTech-128692011-01-30 Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks Saud Rugeish Alotaibi Physical Sciences, Engineering and Technology None IntechOpen 2011-01-30 Chapter, Part Of Book https://www.intechopen.com/chapters/12869 doi:10.5772/12924 en ISBN:978-953-307-402-3 https://creativecommons.org/licenses/by-nc-sa/3.0/ https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design |
| spellingShingle | Physical Sciences, Engineering and Technology Alotaibi, Saud Rugeish Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title | Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title_full | Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title_fullStr | Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title_full_unstemmed | Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title_short | Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks |
| title_sort | security of access in hostile environments based on the history of nodes in ad hoc networks |
| topic | Physical Sciences, Engineering and Technology |
| url | https://www.intechopen.com/chapters/12869 |
| work_keys_str_mv | AT alotaibisaudrugeish securityofaccessinhostileenvironmentsbasedonthehistoryofnodesinadhocnetworks |


