Published in

Journal of Computer Applications, 7(33), p. 1842-1845

DOI: 10.3724/sp.j.1087.2013.01842

Links

Tools

Export citation

Search in Google Scholar

Node behavior and identity-based trusted authentication in wireless sensor networks: Node behavior and identity-based trusted authentication in wireless sensor networks

Journal article published in 2013 by Tao Liu, Yan Xiong, Wenchao Huang, Qiwei Lu, Xudong Gong
This paper was not found in any repository; the policy of its publisher is unknown or unclear.
This paper was not found in any repository; the policy of its publisher is unknown or unclear.

Full text: Unavailable

Question mark in circle
Preprint: policy unknown
Question mark in circle
Postprint: policy unknown
Question mark in circle
Published version: policy unknown