ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
0
references
Top references
cited by
83
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,173
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The sybil attack in sensor networks : analysis & defenses
proceedings-article
Author(s):
James Newsome
,
Elaine Shi
,
Dawn Song
,
Adrian Perrig
Publication date
(Print):
2004
Conference name:
the third international symposium (IPSN'04)
Conference date:
May 26, 2004 - May 27, 2004
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scientific Phone Apps and Mobile Devices
Author and article information
Conference
Publication date (Print):
2004
Page
: 259
Article
DOI:
10.1145/984622.984660
SO-VID:
6400bd91-b3c8-4cb6-9f51-cc918a4f3831
Copyright ©
© 2004
Conference name:
the third international symposium
Conference acronym:
IPSN'04
Conference number:
3
Conference location:
Berkeley, California, USA
Conference date:
May 26, 2004 - May 27, 2004
Conference sponsor:
SIGBED, ACM Special Interest Group on Embedded Systems
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,173
Molecular Signatures in Arabidopsis thaliana in Response to Insect Attack and Bacterial Infection
Authors:
Pankaj Barah
,
Per Winge
,
Anna Kusnierczyk
…
Landscape predictors of wolf attacks on bear-hunting dogs in Wisconsin, USA
Authors:
Erik R. Olson
,
Adrian Treves
,
Adrian Wydeven
…
Prey attack, food preference and growth in juveniles of the edible muricid snail, Chorus giganteus
Authors:
RM Gutierrez
,
CS Gallardo
See all similar
Cited by
82
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Authors:
Wei Zhao
,
Jie Lin
,
Wei Yu
…
Sensor network security: a survey
Authors:
Xiangqian Chen
,
Niki Pissinou
,
Kang Yen
…
Sybil Attacks and Their Defenses in the Internet of Things
Authors:
Kuan Zhang
,
Xuemin Shen
,
Rongxing Lu
…
See all cited by