Bibliography
- G. Theodorakopoulos and J. S. Baras. Malicious Users in Unstructured Networks. IEEE Infocom 2007, Anchorage, AK, May 2007.pdf
- George Theodorakopoulos and John S. Baras. A Testbed for Comparing Trust Computation Algorithms.25th Army Science Conference, Orlando, FL, Nov. 2006. pdf
- H. Chan, A. Perrig.Security and Privacy in Sensor Networks. IEEE Computer, 36(10), October 2003, pp103-105.pdf
- Haowen Chan, Adrian Perrig, Dawn Song. Key Distribution Techniques for Sensor Networks.Wireless Sensor Networks. Kluwer Academic Publishers, 2004.pdf
- P. C. Johnson, A. Kapadia, D. Kotz, and N. Triandopoulos, People-Centric Urban Sensing: Security Challenges for the New Paradigm,Dartmouth Computer Science Technical Report TR2007-586, Feb 2007.pdf
- S. Gilbert, R. Guerraoui, and C. Newport. Of Malicious Motes and Suspicious Sensors. Proceedings of the 10th International Conference on Principles Of Distributed Systems (OPODIS), 2006pdf