Login / Signup

General secure sensor aggregation in the presence of malicious nodes.

Keith B. FrikkenKyle KauffmanAaron Steele
Published in: ICDE (2011)
Keyphrases
  • sensor networks
  • sensor data
  • data mining
  • response time
  • computer simulation
  • key management
  • malicious behavior