Browsing by Subject "k-selection"

Now showing items 1-1 of 1

  • Of Malicious Motes and Suspicious Sensors 

    Unknown author (2006-04-19)
    How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...