First Page | Document Content | |
---|---|---|
Date: 2011-11-09 13:26:15Wireless sensor network Computer programming Technology Merkle signature scheme Kademlia Distributed data storage Computing Binary tree | Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {qAdd to Reading ListSource URL: discovery.csc.ncsu.eduDownload Document from Source WebsiteFile Size: 215,26 KBShare Document on Facebook |