2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications 2007
DOI: 10.1109/ictmicc.2007.4448699
|View full text |Cite
|
Sign up to set email alerts
|

Secure consensus averaging in sensor networks using random offsets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 55 publications
(43 citation statements)
references
References 5 publications
0
43
0
Order By: Relevance
“…Proof 10 (Proof of Theorem 3.2): Given (5), it is straightforward to see that (6a) is necessary and sufficient for (4a). Next, we observe that using (5), we can write lim t→∞ t 0 R ⊤ (f (τ ) + D out g(τ ))dτ = R ⊤ β 1 · · · β N ⊤ . Then, it follows from the statement (b) of Lemma 7.2 that lim t→∞ t 0 e −L + (t−τ ) R ⊤ (f (τ ) + D out g(τ ))dτ = 0.…”
Section: Lemma 73 (Auxiliary Results 3)mentioning
confidence: 99%
See 4 more Smart Citations
“…Proof 10 (Proof of Theorem 3.2): Given (5), it is straightforward to see that (6a) is necessary and sufficient for (4a). Next, we observe that using (5), we can write lim t→∞ t 0 R ⊤ (f (τ ) + D out g(τ ))dτ = R ⊤ β 1 · · · β N ⊤ . Then, it follows from the statement (b) of Lemma 7.2 that lim t→∞ t 0 e −L + (t−τ ) R ⊤ (f (τ ) + D out g(τ ))dτ = 0.…”
Section: Lemma 73 (Auxiliary Results 3)mentioning
confidence: 99%
“…The proof of Theorem 3.2 is given in the appendix. We refer to the admissible signals chosen according to (5) and (6) as the locally chosen admissible signals. For a given set of…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations