共 35 条
- [1] AbuHmed T, 2009, GLOB TELECOMM CONF, P4680
- [2] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
- [5] Engi H, 2002, Survey on Transitive Signature Schemes, P6
- [6] Feng LB, 2018, INT C COMP SUPP COOP, P75, DOI 10.1109/CSCWD.2018.8465319
- [7] [高政风 Gao Zhengfeng], 2020, [软件学报, Journal of Software], V31, P1124
- [8] Granjal J., 2013, 2013 IFIP NETW C, P1
- [10] Hammi MT, 2018, IEEE WCNC, DOI 10.1109/ICTON.2018.8473771