[1]
H. Vamshi krishna and G. Swain, “Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method”, IJET, vol. 7, no. 4.7, pp. 152–156, Sep. 2018, doi: 10.14419/ijet.v7i4.7.20533.