Authors | Takuji Tsuda Yuka Komai Yuya Sasaki Takahiro Hara Shojiro Nishio |
---|---|
Book | Proceedings of IEEE International Conference on Mobile Data Management (From Proceedings of IEEE International Conference on Mobile Data Management) Page.279-288, |
Published | 2014 . 07 |
Tags | |
Fund | 助成:挑戦的萌芽研究(26540035), 基盤研究S(21220002), 基盤研究B(24300037), 開催地:Brisbane, Australia, 開催日程:7/14-7/18 |
DOI | - |
URL | - |
@inproceedings{id_9251, title = {Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in {MANETs}}, author = {Tsuda, Takuji and Komai, Yuka and Sasaki, Yuya and Hara, Takahiro and Nishio, Shojiro}, booktitle = {Proceedings of IEEE International Conference on Mobile Data Management}, pages = {279--288}, month = {7}, year = {2014}, }