Login / Signup

Attack-tolerant localization via iterative verification of locations in sensor networks.

Taejoon ParkKang G. Shin
Published in: ACM Trans. Embed. Comput. Syst. (2008)
Keyphrases