Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance. [Citation Graph (, )][DBLP]
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP]
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. [Citation Graph (, )][DBLP]
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP]
Secure median computation in wireless sensor networks. [Citation Graph (, )][DBLP]
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP