Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs

Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio. Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs. In Arkady B. Zaslavsky, Panos K. Chrysanthis, Christian Becker, Jadwiga Indulska, Mohamed F. Mokbel, Daniela Nicklas, Chi-Yin Chow, editors, IEEE 15th International Conference on Mobile Data Management, MDM 2014, Brisbane, Australia, July 14-18, 2014 - Volume 1. pages 279-288, IEEE, 2014. [doi]

Authors

Takuji Tsuda

This author has not been identified. Look up 'Takuji Tsuda' in Google

Yuka Komai

This author has not been identified. Look up 'Yuka Komai' in Google

Yuya Sasaki

This author has not been identified. Look up 'Yuya Sasaki' in Google

Takahiro Hara

This author has not been identified. Look up 'Takahiro Hara' in Google

Shojiro Nishio

This author has not been identified. Look up 'Shojiro Nishio' in Google