共 15 条
- [1] Zhou Y., Fang Y., Zhang Y., Securing wireless sensor networks: A survey, Communications Surveys & Tutorials, IEEE, 10, 3, pp. 6-28, (2008)
- [2] Bekmezci I., Alagoz F., Energy efficient, delay sensitive, fault tolerant wireless sensor network for military monitoring, International Journal of Distributed Sensor Networks, 5, 6, pp. 729-747, (2009)
- [3] Chen X., Makki K., Yen K., Pissinou N., Sensor network security: A survey, Communications Surveys & Tutorials, IEEE, 11, 2, pp. 52-73, (2009)
- [4] Yick J., Mukherjee B., Ghosal D., Wireless sensor network survey, Computer networks, 52, 12, pp. 2292-2330, (2008)
- [5] Kavitha T., Sridharan D., Security vulnerabilities in wireless sensor networks: A survey, Journal of information Assurance and Security, 5, 1, pp. 31-44, (2010)
- [6] Lamport L., Shostak R., Pease M., The Byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), 4, 3, pp. 382-401, (1982)
- [7] Correia M., Bessani N.A., Verissimo P., On Byzantine generals with alternative plans, Journal of Parallel and Distributed Computing, 68, 9, pp. 1291-1296, (2008)
- [8] Kapron M.B., Kempe D., King V., Saia J., Sanwalani V., Fast asynchronous byzantine agreement and leader election with full information, ACM Transactions on Algorithms (TALG), 6, 4, (2010)
- [9] King V., Saia J., Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary, Journal of the ACM (JACM), 58, 4, (2011)
- [10] AlZain M.A., Soh B., Pardede E., A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds, Journal of Software, 8, 5, pp. 1068-1078, (2013)