Sciweavers

6 search results - page 2 / 2
» Pollution Attack Defense for Coding Based Sensor Storage
Sort
View
ACSAC
2006
IEEE
13 years 10 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra