Author:
Roman Rodrigo,Alcaraz Cristina,Lopez Javier
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference46 articles.
1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Computer Networks: Int J Comput Telecommun Netw 38(4):393–422, March
2. Walters JP, Liang Z, Shi W, Chaudhary V (2006) Wireless sensor network security: a survey. In: Xiao Y. (ed) Security in distributed, grid, and pervasive computing. Auerbach Publications, CRC Press, ISBN 0-849-37921-0
3. Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. IEEE 3nd international workshop on information processing in sensor networks (IPSN’04), April
4. Alcaraz C, Roman R (2006) Applying key infrastructures for sensor networks in CIP/CIIP scenarios. In: Proceedings of the 1st international workshop on critical information infrastructures security (CRITIS 2006). Samos, Greece, August–September
5. Kaps J-P, Gaubatz G, Sunar B (2007) Cryptography on a speck of dust. IEEE Computer 40(2):38–44, February
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献