Login / Signup

An efficient scheme for removing compromised sensor nodes from wireless sensor networks.

Yong WangByrav RamamurthyXukai ZouYuyan Xue
Published in: Secur. Commun. Networks (2010)
Keyphrases