<--- Back to Details
First PageDocument Content
Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree
Date: 2011-11-09 13:26:15
Wireless sensor network
Computer programming
Technology
Merkle signature scheme
Kademlia
Distributed data storage
Computing
Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Download Document from Source Website

File Size: 215,26 KB

Share Document on Facebook

Similar Documents