Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015 (2015), Article ID 801632, 10 pages
http://dx.doi.org/10.1155/2015/801632
Research Article

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

1Department of Computer Science, Er.Perumal Manimekalai College of Engineering, Hosur 635117, India
2Er.Perumal Manimekalai College of Engineering, Hosur 635117, India
3Department of Information Technology, KSR College of Technology, Tiruchengode 637211, India

Received 12 September 2014; Accepted 1 January 2015

Academic Editor: Hai Jiang

Copyright © 2015 B. Madhusudhanan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [3 citations]

The following is the list of published articles that have cited the current article.

  • Umapathi, and Ramaraj, “Wireless adhoc telemedicine system: Improving network performance for multimedia data,” Journal of Medical Imaging and Health Informatics, vol. 6, no. 8, pp. 1944–1948, 2016. View at Publisher · View at Google Scholar
  • Anchitaalagammai, N. Uma Maheswari, and Venkatesh, “A bee swarm optimized trust based security mechanism in ad hoc network,” Journal of Medical Imaging and Health Informatics, vol. 6, no. 8, pp. 2069–2074, 2016. View at Publisher · View at Google Scholar
  • Rajagopal Venkatesan, Balakrishnan Srinivasan, and Periyasamy Rajendiran, “Tiger hash based AdaBoost machine learning classifier for secured multicasting in mobile healthcare system,” Cluster Computing, 2018. View at Publisher · View at Google Scholar