This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. * <text size="large">**On Node Capturing Attacker Strategies**</text>\\ [[:publications:authors:filip-jurnecka|Filip Jurnecka]], [[:publications:authors:martin-stehlik|Martin Stehlik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers//, Springer LNCS, 2014, 300-315.\\ Keywords: [[:publications:keywords:wsn|wsn]], [[http://dx.doi.org/10.1007/978-3-319-12400-1_29|DOI website]], ++ BibTeX |<code>@InProceedings{2014-spw-jurnecka, title = {On Node Capturing Attacker Strategies}, author = {Filip Jurnecka and Martin Stehlik and Vashek Matyas}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014. Revised Selected Papers}, pages = {300-315}, publisher = {Springer LNCS}, year = {2014}, doi = {10.1007/978-3-319-12400-1_29}, keywords = {WSN}, } </code>++