Cited By
View all- Chia-Mu Yu Yao-Tung Tsou Chun-Shien Lu Sy-Yen Kuo (2018)Constrained Function-Based Message Authentication for Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2011.21061206:2(407-425)Online publication date: 26-Dec-2018
- Krauí CSchneider MEckert C(2018)On handling insider attacks in wireless sensor networksInformation Security Tech. Report10.1016/j.istr.2008.10.01113:3(165-172)Online publication date: 14-Dec-2018
- Lee H(2015)Fuzzy-Based adaptive countering method against false endorsement insertion attacks in wireless sensor networksInternational Journal of Distributed Sensor Networks10.5555/2836620.28366272015(7-7)Online publication date: 1-Jan-2015
- Show More Cited By