共 11 条
[3]
Countermeasures against traffic analysis attacks in wireless sensor networks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:113-124
[4]
Protecting receiver-location privacy in wireless sensor networks
[J].
INFOCOM 2007, VOLS 1-5,
2007,
:1955-+
[5]
Enhancing source-location privacy in sensor network routing
[J].
25th IEEE International Conference on Distributed Computing Systems, Proceedings,
2005,
:599-608
[6]
Karp B., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P243, DOI 10.1145/345910.345953
[7]
Kong Jiejun., 2003, P ACM MOBIHOC, P291
[8]
Kong JJ, 2005, IEEE SYMP COMP COMMU, P57
[9]
Rahman S.M.M., 2008, ANONYMOUS AUTHENTICA
[10]
Seys S, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P133