Logo des Repositoriums
 

Tampering with motes: real-world attacks on wireless sensor networks

dc.contributor.authorBecher, Alexander
dc.contributor.authorBenenson, Zinaida
dc.contributor.authorDornseif, Maximillian
dc.contributor.editorDittmann, Jana
dc.date.accessioned2019-08-26T11:23:07Z
dc.date.available2019-08-26T11:23:07Z
dc.date.issued2006
dc.identifier.isbn3-88579-171-4
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/24799
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2006, Sicherheit – Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-77
dc.titleTampering with motes: real-world attacks on wireless sensor networksen
dc.typeText/Conference Paper
gi.citation.endPage29
gi.citation.publisherPlaceBonn
gi.citation.startPage26
gi.conference.date20.-22. Februar 2006
gi.conference.locationMagdeburg
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings-77-5.pdf
Größe:
1.85 MB
Format:
Adobe Portable Document Format