Search: 簡易 | 詳細 || Language: 英語 | 日本語 || Login: ログイン | Help: ヘルプ |


3 件の該当がありました. : このページのURL : HTML

[1] Takuji Tsuda, Yuka Komai, Takahiro Hara, and Shojiro Nishio, "Signature-Based Top-K Query Processing Against Data Replacement Attacks in Manets," Proc. of Int'l Symposium on Reliable Distributed Systems (SRDS 2015), pages 130-139 September 2015.
[2] Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs," Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014), pages 279-288 July 2014.
[3] Jinfang Jiang, Guangjie Han, Lei Shu, Han-Chieh Chao, and Shojiro Nishio, "A Novel Secure Localization Scheme Against Collaborative Collusion in Wireless Sensor Networks," Proc. of Int'l Wireless Communications & Mobile Computing Conference (IWCMC 2011), pages 308-313 July 2011.