Back to Results
First PageMeta Content
Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree


Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q
Add to Reading List

Document Date: 2011-11-09 13:26:15


Open Document

File Size: 215,26 KB

Share Result on Facebook
UPDATE