From post

COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks.

, , и . DCOSS, том 4026 из Lecture Notes in Computer Science, стр. 338-355. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction., , , и . Digital Fingerprinting, Springer, (2016)Conclusion., , , и . Digital Fingerprinting, Springer, (2016)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , и . APSEC, стр. 355-362. IEEE, (2019)A Graph-Based Investigation of Bitcoin Transactions., и . IFIP Int. Conf. Digital Forensics, том 462 из IFIP Advances in Information and Communication Technology, стр. 79-95. Springer, (2015)A robust group-based key management scheme for wireless sensor networks., и . WCNC, стр. 1915-1920. IEEE, (2005)FishEYE: A Forensic Tool for the visualization of change-over-time in Windows VSS., и . SADFE, стр. 1-7. IEEE, (2013)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , и . Comput. Commun., 28 (14): 1618-1630 (2005)Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization., , , , , и . HPCC/CSS/ICESS, стр. 1031-1036. IEEE, (2015)A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery., и . IFIP Int. Conf. Digital Forensics, том 194 из IFIP, стр. 79-90. Springer, (2005)An Effective Method for Combating Malicious Scripts Clickbots., , , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 523-538. Springer, (2009)