共 15 条
- [1] [Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
- [2] Barati A, 2008, P 2 INT C SENS TECHN, P81
- [3] Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
- [4] Boyle D, 2007, P 3 INT C WIR MOB CO, P123
- [5] Cannan W D, 2000, CONSTRAINTS APPROACH, P00
- [6] Random key predistribution schemes for sensor networks [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
- [7] Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
- [10] Eschenauer L., 2002, 9 ACM C COMP COMM P, V17, P41