共 10 条
[1]
BLOM R, LECT NOTES COMPUTER, V209, P335
[2]
Blundo C., 1993, LNCS, V740, P471
[3]
Chan H., 2003, IEEE S RES SEC PRIV
[4]
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[5]
ESCHENAUER L, 2002, P 6 ACM C COMP COMM
[6]
JOHNSON D, 2002, DYN SOURC ROUT PROT
[7]
LIU D, 2003, P 10 ACM C COMP COMM, P52
[8]
PERRIG A, 2001, P 7 ANN INT C MOB CO
[9]
Zhu S., 2003, Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, P62, DOI [DOI 10.1145/948117.948120, DOI 10.1145/948109.948120]
[10]
ZHU S, 2003, 11 IEEE INT C NETW P