Related references
Note: Only part of the references are listed.How Do You Compute the Midpoint of an Interval?
Frederic Goualard
ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE (2014)
Distributed Detection of Clone Attacks in Wireless Sensor Networks
Mauro Conti et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)
On the detection of clones in sensor networks using random key predistribution
Richard Brooks et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2007)
Wireless sensor networks: a survey
IF Akyildiz et al.
COMPUTER NETWORKS (2002)