Inproceedings,

Locating Compromised Sensor Nodes Through Incremental Hashing Authentication.

, , , and .
DCOSS, volume 4026 of Lecture Notes in Computer Science, page 321-337. Springer, (2006)

Meta data

Tags

Users

  • @dblp

Comments and Reviews