Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-37949-9_75 | QSHINE |
Field | DocType | Citations |
Key distribution in wireless sensor networks,Replica,Steganography,Computer science,Wormhole attack,Computer network,Wireless sensor network,Distributed computing | Conference | 0 |
PageRank | References | Authors |
0.34 | 14 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
N. Ambika | 1 | 0 | 1.01 |
G. T. Raju | 2 | 0 | 2.37 |