"Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc ..."

Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen (2008)

Details and statistics

DOI: 10.4304/JCM.3.1.20-26

access: closed

type: Journal Article

metadata version: 2022-01-03

a service of  Schloss Dagstuhl - Leibniz Center for Informatics