Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks

None

Guardado en:
Detalles Bibliográficos
Autor principal: Alotaibi, Saud Rugeish
Formato: Electrónico Capítulo de libro
Lenguaje:inglés
Publicado: IntechOpen 2011
Materias:
Acceso en línea:https://www.intechopen.com/chapters/12869
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
_version_ 1839561195312381952
author Alotaibi, Saud Rugeish
author_facet Alotaibi, Saud Rugeish
author_sort Alotaibi, Saud Rugeish
collection InTech Open eBooks
description None
doi_str_mv 10.5772/12924
first_indexed 2025-08-04T21:17:45Z
format Electronic
Book Chapter
fullrecord <oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><identifier>InTech-12869</identifier><datestamp>2011-01-30</datestamp> <dc:title>Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks</dc:title> <dc:creator>Saud Rugeish Alotaibi</dc:creator> <dc:subject>Physical Sciences, Engineering and Technology</dc:subject> <dc:description>None</dc:description> <dc:publisher>IntechOpen</dc:publisher> <dc:date>2011-01-30</dc:date> <dc:type>Chapter, Part Of Book</dc:type> <dc:identifier>https://www.intechopen.com/chapters/12869</dc:identifier> <dc:identifier>doi:10.5772/12924</dc:identifier> <dc:language>en</dc:language> <dc:relation>ISBN:978-953-307-402-3</dc:relation> <dc:rights>https://creativecommons.org/licenses/by-nc-sa/3.0/</dc:rights> <dc:source>https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design</dc:source> </oai_dc:dc>
id InTech-12869
institution Matheson Library
isbn 978-953-307-402-3
language English
last_indexed 2025-08-04T21:17:45Z
publishDate 2011
publisher IntechOpen
record_format intech
spelling InTech-128692011-01-30 Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks Saud Rugeish Alotaibi Physical Sciences, Engineering and Technology None IntechOpen 2011-01-30 Chapter, Part Of Book https://www.intechopen.com/chapters/12869 doi:10.5772/12924 en ISBN:978-953-307-402-3 https://creativecommons.org/licenses/by-nc-sa/3.0/ https://www.intechopen.com/books/15 ; Mobile Ad-Hoc Networks: Protocol Design
spellingShingle Physical Sciences, Engineering and Technology
Alotaibi, Saud Rugeish
Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_full Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_fullStr Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_full_unstemmed Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_short Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks
title_sort security of access in hostile environments based on the history of nodes in ad hoc networks
topic Physical Sciences, Engineering and Technology
url https://www.intechopen.com/chapters/12869
work_keys_str_mv AT alotaibisaudrugeish securityofaccessinhostileenvironmentsbasedonthehistoryofnodesinadhocnetworks