//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"Betrug"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Malicious node identification...
Similar by subject
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Betrug
VANET
18
AODV
4
IoT
3
Data security
2
Datensicherheit
2
IoV
2
MANET
2
Mobile communications
2
Mobilkommunikation
2
OSM
2
RREP
2
RREQ
2
Routing Protocol
2
SIoV
2
SUMO
2
Security
2
USA
2
United States
2
vehicular ad hoc network
2
Ad Hoc
1
Ad-hoc-Vernetzung
1
Adaptive Routing
1
BP-MDF
1
Bezier Curve
1
Black Hole
1
Black Hole Attack
1
Broadcast
1
Car2Car-Communication
1
Carry Forwarding
1
Cloud Computing
1
Clustering
1
Communication Overhead
1
Congested flow
1
Congestion
1
Congestion Passenger
1
Cooperation
1
DSRC
1
DTN
1
Data Aggregation
1
more ...
less ...
Type of publication
All
Article
1
Type of publication (narrower categories)
All
Article in journal
1
Aufsatz in Zeitschrift
1
Language
All
English
1
Author
All
Falahati, Abolfazl
1
Jannati, Hoda
1
Published in...
All
Electronic commerce research
1
Source
All
ECONIS (ZBW)
1
Showing
1
-
1
of
1
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices
Falahati, Abolfazl
;
Jannati, Hoda
- In:
Electronic commerce research
15
(
2015
)
1
,
pp. 75-95
Persistent link: https://www.econbiz.de/10011284258
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->