Release Time:2019-03-12 Hits:
Indexed by: Journal Article
Date of Publication: 2012-01-01
Journal: Personal and Ubiquitous Computing
Volume: 16
Issue: 5
Page Number: 1-13
Prev One:A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set
Next One:Protecting the Sink Location Privacy in Wireless Sensor Networks