Login / Signup

Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.

Katharine ChangKang G. Shin
Published in: ACM Trans. Inf. Syst. Secur. (2008)
Keyphrases
  • integrity verification
  • wireless sensor networks
  • copyright protection
  • energy consumption
  • information hiding
  • routing protocol
  • sensor networks
  • peer to peer
  • routing algorithm
  • data transmission
  • database