Author of the publication

Dealing with random and selective attacks in wireless sensor systems.

, , and . ACM Trans. Sens. Networks, 6 (2): 15:1-15:40 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Spatial Database Operations., , and . SSTD, volume 2750 of Lecture Notes in Computer Science, page 140-158. Springer, (2003)Efficient data dissemination using locale covers., , and . Pervasive Mob. Comput., 4 (2): 254-275 (2008)Uncertain spatial data handling: Modeling, indexing and query., , , , and . Comput. Geosci., 33 (1): 42-61 (2007)Efficient data dissemination using locale covers., , and . CIKM, page 243-244. ACM, (2005)Efficient key establishment for group-based wireless sensor deployments., , and . Workshop on Wireless Security, page 1-10. ACM, (2005)Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks., , and . SecureComm, page 397-399. IEEE, (2005)Supporting Secure Communication and Data Collection in Mobile Sensor Networks., , and . INFOCOM, IEEE, (2006)Dealing with random and selective attacks in wireless sensor systems., , and . ACM Trans. Sens. Networks, 6 (2): 15:1-15:40 (2010)Indexing Spatio-Temporal Trajectories with Efficient Polynomial Approximations., and . IEEE Trans. Knowl. Data Eng., 19 (5): 663-678 (2007)PA-Tree: A Parametric Indexing Scheme for Spatio-temporal Trajectories., and . SSTD, volume 3633 of Lecture Notes in Computer Science, page 254-272. Springer, (2005)