Release Time:2019-03-13 Hits:
Indexed by: Journal Article
Date of Publication: 2012-01-01
Journal: Signal Processing
Volume: 92
Issue: 6
Page Number: 1525-1535
Prev One:Self-healing Key distribution Scheme with Collusion Attack Resistance based on One-way Key Chains and Secret Sharingin Wireless Sensor Networks
Next One:Fuzzy Set Theory-Based Trust Models in Multi-Agent Environment