In this paper, the authors present an investigative analysis of Repudiation attack that arrives at the application layer in mobile ad-hoc network. Most of.
確定! 回上一頁