09.01.2015 Views

Authentication in Ad hoc Networks: A Case Study - Ecet

Authentication in Ad hoc Networks: A Case Study - Ecet

Authentication in Ad hoc Networks: A Case Study - Ecet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

International Conference on Computer Systems and Technologies - CompSysTech’ 2005<br />

15. Alan, K., Infrastructure for Distributed Applications <strong>in</strong> <strong>Ad</strong> Hoc <strong>Networks</strong> of Small Mobile<br />

Wireless Devices. 2001.<br />

16. Pirzada, A.A. and McDonald, C., Establish<strong>in</strong>g Trust In Pure <strong>Ad</strong>-Hoc <strong>Networks</strong>. 27th<br />

Australasian Computer Science Conference, Volume 26, ed. V. Estivill-Castro. 2004,<br />

Duned<strong>in</strong>, New Zealand. 47 - 54.<br />

ABOUT THE AUTHORS<br />

Assoc. Lecturer. Candelaria Hernández-Goya, PhD, Department of Statistics, O.R. and<br />

Comput<strong>in</strong>g, Universidad de La Laguna, Phone: +34 922 318 637, -mail: mchgoya@ull.es<br />

- - L2-5 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!