[1]
M. Bhuvaneswari and L. VijayaKalyani, “Authentication Procedures for Ad-hoc Networks: Taxonomy and Investigation Subjects”, Int. J. Comp. Sci. Eng., vol. 2, no. 9, pp. 90–99, Sep. 2014.