Sign in

Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.

Shiuh-Jeng WangYuh-Ren TsaiChung-Wei Chen
Published in: J. Commun. (2008)
Keyphrases