Login / Signup
General secure sensor aggregation in the presence of malicious nodes.
Keith B. Frikken
Kyle Kauffman
Aaron Steele
Published in:
ICDE (2011)
Keyphrases
</>
sensor networks
sensor data
data mining
response time
computer simulation
key management
malicious behavior