[HTML][HTML] A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng, T Wang - Sensors, 2018 - mdpi.com
The Internet of things (IoT) is composed of billions of sensing devices that are subject to
threats stemming from increasing reliance on communications technologies. A Trust-Based …

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-HarvestingWireless Sensor Networks.

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng… - Sensors …, 2018 - search.ebscohost.com
Abstract The Internet of things (IoT) is composed of billions of sensing devices that are
subject to threats stemming from increasing reliance on communications technologies. A …

[HTML][HTML] A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng… - Sensors (Basel …, 2018 - ncbi.nlm.nih.gov
Abstract The Internet of things (IoT) is composed of billions of sensing devices that are
subject to threats stemming from increasing reliance on communications technologies. A …

[引用][C] A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, N Xiong, Z Zeng, T Wang - Sensors, 2018 - cir.nii.ac.jp
A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting
Wireless Sensor Networks | CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ …

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng… - Sensors (Basel …, 2018 - europepmc.org
Abstract The Internet of things (IoT) is composed of billions of sensing devices that are
subject to threats stemming from increasing reliance on communications technologies. A …

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, NN Xiong… - Sensors (Basel …, 2018 - pubmed.ncbi.nlm.nih.gov
The Internet of things (IoT) is composed of billions of sensing devices that are subject to
threats stemming from increasing reliance on communications technologies. A Trust-Based …

[PDF][PDF] A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng… - Sensors, 2018 - pdfs.semanticscholar.org
The Internet of things (IoT) is composed of billions of sensing devices that are subject to
threats stemming from increasing reliance on communications technologies. A Trust-Based …

[引用][C] A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, N Xiong, Z Zeng, T Wang - Sensors, 2018 - ui.adsabs.harvard.edu
A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting
Wireless Sensor Networks - NASA/ADS Now on home page ads icon ads Enable full ADS …

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng, T Wang - Sensors, 2018 - search.proquest.com
Abstract The Internet of things (IoT) is composed of billions of sensing devices that are
subject to threats stemming from increasing reliance on communications technologies. A …