Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ica3pp/HuangSA12
%A Huang, Xu
%A Sharma, Dharmendra
%A Ahmed, Muhammad
%B ICA3PP (1)
%D 2012
%E Xiang, Yang
%E Stojmenovic, Ivan
%E Apduhan, Bernady O.
%E Wang, Guojun
%E Nakano, Koji
%E Zomaya, Albert Y.
%I Springer
%K dblp
%P 16-29
%T Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
%U http://dblp.uni-trier.de/db/conf/ica3pp/ica3pp2012-1.html#HuangSA12
%V 7439
%@ 978-3-642-33077-3
@inproceedings{conf/ica3pp/HuangSA12,
added-at = {2024-03-20T00:00:00.000+0100},
author = {Huang, Xu and Sharma, Dharmendra and Ahmed, Muhammad},
biburl = {https://www.bibsonomy.org/bibtex/27f56ab04183d7afa9ec0faad81c0a38b/dblp},
booktitle = {ICA3PP (1)},
crossref = {conf/ica3pp/2012-1},
editor = {Xiang, Yang and Stojmenovic, Ivan and Apduhan, Bernady O. and Wang, Guojun and Nakano, Koji and Zomaya, Albert Y.},
ee = {https://doi.org/10.1007/978-3-642-33078-0_2},
interhash = {f39a27bb576002370cb86da010066b72},
intrahash = {7f56ab04183d7afa9ec0faad81c0a38b},
isbn = {978-3-642-33077-3},
keywords = {dblp},
pages = {16-29},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-10T07:04:45.000+0200},
title = {Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.},
url = {http://dblp.uni-trier.de/db/conf/ica3pp/ica3pp2012-1.html#HuangSA12},
volume = 7439,
year = 2012
}