Login / Signup
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.
Katharine Chang
Kang G. Shin
Published in:
ACM Trans. Inf. Syst. Secur. (2008)
Keyphrases
</>
integrity verification
wireless sensor networks
copyright protection
energy consumption
information hiding
routing protocol
sensor networks
peer to peer
routing algorithm
data transmission
database