Protocols for mitigating blackhole attacks in delay tolerant networks
Crossref DOI link: https://doi.org/10.1007/s11276-015-0959-3
Published Online: 2015-05-20
Published Print: 2016-01
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Nagrath, Preeti
Aneja, Sandhya
Gupta, Neelima
Madria, Sanjay
Text and Data Mining valid from 2015-05-20