Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/sac/HuangSZSXD15
%A Huang, Jun
%A Sun, Meisong
%A Zhu, Shitong
%A Sun, Yi
%A Xing, Cong-Cong
%A Duan, Qiang
%B SAC
%D 2015
%E Wainwright, Roger L.
%E Corchado, Juan Manuel
%E Bechini, Alessio
%E Hong, Jiman
%I ACM
%K
%P 688-694
%T A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs.
%U http://dblp.uni-trier.de/db/conf/sac/sac2015.html#HuangSZSXD15
%@ 978-1-4503-3196-8
@inproceedings{conf/sac/HuangSZSXD15,
added-at = {2023-12-12T18:06:00.000+0100},
author = {Huang, Jun and Sun, Meisong and Zhu, Shitong and Sun, Yi and Xing, Cong-Cong and Duan, Qiang},
biburl = {https://www.bibsonomy.org/bibtex/2ad3e1d146fc9ce958ff2a2bbb46f2348/admin},
booktitle = {SAC},
crossref = {conf/sac/2015},
editor = {Wainwright, Roger L. and Corchado, Juan Manuel and Bechini, Alessio and Hong, Jiman},
ee = {https://doi.org/10.1145/2695664.2695843},
interhash = {0d5eca67df735750bc833c8b6258c4cb},
intrahash = {ad3e1d146fc9ce958ff2a2bbb46f2348},
isbn = {978-1-4503-3196-8},
keywords = {},
pages = {688-694},
publisher = {ACM},
timestamp = {2023-12-12T18:06:00.000+0100},
title = {A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs.},
url = {http://dblp.uni-trier.de/db/conf/sac/sac2015.html#HuangSZSXD15},
year = 2015
}