共 14 条
- [1] Abdul Rahaman A., 1997, 1997 WORKSH NEW SEC
- [2] Back A., 2002, A denial of service counter-measure
- [3] Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
- [4] Bettstetter Christian., 2003, ACM SIGMOBILE Mobile Computing and Communications Review, V7, P50, DOI DOI 10.1145/961268.961287
- [5] Dijkstra E. W., 1959, NUMER MATH, V1, P269
- [6] IEEE Standard ICSLMS Committee, 1997, WIR LAN MED ACC CONT
- [7] Jonker C.M., 1999, Proceedings of MAAMAW'99. LNAI 1647, P221
- [8] Josang A., 2003, Workshop on Formal Aspects in Security and Trust, FAST, P9
- [9] Pirzada A. A., 2007, ADV WIRELESS AD HOC
- [10] Trust-based routing for ad-hoc wireless networks [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330