Tampering with motes: real-world attacks on wireless sensor networks
dc.contributor.author | Becher, Alexander | |
dc.contributor.author | Benenson, Zinaida | |
dc.contributor.author | Dornseif, Maximillian | |
dc.contributor.editor | Dittmann, Jana | |
dc.date.accessioned | 2019-08-26T11:23:07Z | |
dc.date.available | 2019-08-26T11:23:07Z | |
dc.date.issued | 2006 | |
dc.identifier.isbn | 3-88579-171-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/24799 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2006, Sicherheit – Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-77 | |
dc.title | Tampering with motes: real-world attacks on wireless sensor networks | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 29 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 26 | |
gi.conference.date | 20.-22. Februar 2006 | |
gi.conference.location | Magdeburg | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1