Location-based compromise-tolerant security mechanisms for wireless sensor networks. Zhang, Y., Liu, W., Lou, W., & Fang, Y. IEEE Journal on Selected Areas in Communications, 24(2):247--260, 2006. Paper doi bibtex @article{DBLP:journals/jsac/ZhangLLF06,
author = {Yanchao Zhang and
Wei Liu and
Wenjing Lou and
Yuguang Fang},
title = {Location-based compromise-tolerant security mechanisms for wireless
sensor networks},
journal = {{IEEE} Journal on Selected Areas in Communications},
volume = {24},
number = {2},
pages = {247--260},
year = {2006},
url = {http://dx.doi.org/10.1109/JSAC.2005.861382},
doi = {10.1109/JSAC.2005.861382},
timestamp = {Mon, 30 May 2016 01:00:00 +0200},
biburl = {http://dblp.dagstuhl.de/rec/bib/journals/jsac/ZhangLLF06},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"YJM8qqwW7kBEzd9w8","bibbaseid":"zhang-liu-lou-fang-locationbasedcompromisetolerantsecuritymechanismsforwirelesssensornetworks-2006","downloads":0,"creationDate":"2016-10-21T15:13:51.468Z","title":"Location-based compromise-tolerant security mechanisms for wireless sensor networks","author_short":["Zhang, Y.","Liu, W.","Lou, W.","Fang, Y."],"year":2006,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/l/Lou:Wenjing","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Yanchao"],"propositions":[],"lastnames":["Zhang"],"suffixes":[]},{"firstnames":["Wei"],"propositions":[],"lastnames":["Liu"],"suffixes":[]},{"firstnames":["Wenjing"],"propositions":[],"lastnames":["Lou"],"suffixes":[]},{"firstnames":["Yuguang"],"propositions":[],"lastnames":["Fang"],"suffixes":[]}],"title":"Location-based compromise-tolerant security mechanisms for wireless sensor networks","journal":"IEEE Journal on Selected Areas in Communications","volume":"24","number":"2","pages":"247--260","year":"2006","url":"http://dx.doi.org/10.1109/JSAC.2005.861382","doi":"10.1109/JSAC.2005.861382","timestamp":"Mon, 30 May 2016 01:00:00 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/jsac/ZhangLLF06","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/jsac/ZhangLLF06,\n author = {Yanchao Zhang and\n Wei Liu and\n Wenjing Lou and\n Yuguang Fang},\n title = {Location-based compromise-tolerant security mechanisms for wireless\n sensor networks},\n journal = {{IEEE} Journal on Selected Areas in Communications},\n volume = {24},\n number = {2},\n pages = {247--260},\n year = {2006},\n url = {http://dx.doi.org/10.1109/JSAC.2005.861382},\n doi = {10.1109/JSAC.2005.861382},\n timestamp = {Mon, 30 May 2016 01:00:00 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/journals/jsac/ZhangLLF06},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Zhang, Y.","Liu, W.","Lou, W.","Fang, Y."],"key":"DBLP:journals/jsac/ZhangLLF06","id":"DBLP:journals/jsac/ZhangLLF06","bibbaseid":"zhang-liu-lou-fang-locationbasedcompromisetolerantsecuritymechanismsforwirelesssensornetworks-2006","role":"author","urls":{"Paper":"http://dx.doi.org/10.1109/JSAC.2005.861382"},"downloads":0,"html":""},"search_terms":["location","based","compromise","tolerant","security","mechanisms","wireless","sensor","networks","zhang","liu","lou","fang"],"keywords":[],"authorIDs":[],"dataSources":["A7xqyS84Q4jXrtW8C"]}