@incollection{, 93FE5073D552EBD1CA2BDFBD67DA134B , author={{T.Sukumar} and {T.Sukumar} and {Sri Venkateswara College of Engineering, Anna University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1433338 } @book{b0, , author={{ ChavanLErtaul }} , title={{Security of Ad Hoc Networks and Threshold Cryptography" International Conference on Wireless Networks, Communications and Mobile Computing}} , year={2006} } @incollection{b1, , title={{Incentive-Compatible Opportunistic Routing for Wireless Networks}} , author={{ FanWu } and { TingtingChen } and { ShengZhong } and { LiErranLi } and { YangRichardYang }} , booktitle={{MOBICOM 2008, Proceedings of the Fourteenth Annual International Conference Mobile Computing and Networking Pages}} } @book{b2, , title={{Capacity Management and Equilibrium for Proportional QoS}} , author={{ IshaiMenache } and { NahumShimkin }} } @incollection{b3, , title={{}} , journal={{IEEE/ACM Transcations on Networking}} 16 5 , year={October 2008} } @book{b4, , title={{A Verifiable Secret Sharing Scheme based on Chinese Remainder Theorem}} , author={{ CKaya } and { ASelcuk }} , year={2008} , note={INDOCRYPT} } @incollection{b5, , title={{An efficient scheme for key pre-distribution in wireless sensor Networks}} , author={{ ManelBoujelben1 } and { MohamedHabib Youssef2 } and { Abid }} , booktitle={{IEEE International Conference on Wireless & Mobile Computing, Networking & Communication}} , year={2009} } @incollection{b6, , title={{Minimum-Energy All-to-All Multicasting in Wireless Ad Hoc Networks}} , author={{ WeifaLiang } and { RichardBrent } and { YinlongXu } and { QingshanWang }} , journal={{IEEE Transcations on Wireless Communications}} 8 11 , year={November 2009} } @book{b7, , title={{An Algorithmic Approach to Geographic Routing in Ad Hoc and Sensor Networks}} , author={{ FabianKuhn } and { RogerWattenhofer } and { AaronZollinger }} } @incollection{b8, , title={{}} , journal={{IEEE/ACM Transcations on Networking}} 16 1 , year={February 2008} } @incollection{b9, , title={{Analysis Of Kim -Jeon-Yoo Password Authentication Schemes}} , author={{ JiqiangLiu } and { ShengZhong }} , journal={{Cryptologia}} 33 2 , year={2009} }