共 26 条
[1]
Huang Y., Esmalifalak M., Nguyen H., Zheng R., Han Z., IEEE Commun. Mag., 51, (2013)
[2]
Perrig A., Szewczyk R., Tygar J.D., Wirl. Netw, 8, (2002)
[3]
Kumar S.R., Sidhartha P., Kumar R.U., Prabina R., J. Bioinf. Intell. Control, 2, (2013)
[4]
Eschenauer L., Gligor V.D., Proc. 9th ACM Conference on Computer and Communications Security, (2002)
[5]
Chan H., Perrig A., Song D., Proc. 2003 IEEE on Security and Privacy, (2003)
[6]
Abdelaziz A.Y., Osama R.A., Elkhodary S.M., J. Bioinf. Intell. Control, 2, (2013)
[7]
Du W.L., Deng J., Han Y.S., Varshney P.K., Katz J., Khalili A., Proc. 10th ACM Conference on Computer and Communication Security, (2003)
[8]
Liu D.G., Ning P., Proc. 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, (2003)
[9]
Ali S.Q., Hasanien H.M., Al-Ammar E.A., J. Bioinf. Intell. Control., 2, (2013)
[10]
Zhang Y.T., Yang J., Li W.J., Wang L.Z., Jin L.L., J. Netw. Comput. Appl., 33, (2010)