共 30 条
[1]
[Anonymous], 2008, P IEEE INFOCOM 27 C
[2]
[Anonymous], 2002, Introduction to Cryptography with Coding Theory
[3]
Behavior-based coordination of large-scale robot formations
[J].
FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS,
2000,
:363-364
[4]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[5]
Conner W, 2006, LECT NOTES COMPUT SC, V4026, P202
[6]
Countermeasures against traffic analysis attacks in wireless sensor networks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:113-124
[7]
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[8]
Dimarogonas Dimos V., 2007, 46th IEEE Conference on Decision and Control, P6148
[9]
Self-deployment and Coverage of Mobile Sensors within a Bounded Region
[J].
CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS,
2009,
:3683-3688
[10]
Edith C., 2009, INT C WIRELESS COMMU, P269, DOI DOI 10.1145/1582379.1582439