共 26 条
- [1] [Anonymous], INT J NETW SECUR
- [2] Bingu┬l MA., 2012, INT J INF SECUR SCI, V1, P32
- [3] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
- [4] Blundo C., 1993, ADV CRYPTOLOGY
- [5] Random key predistribution schemes for sensor networks [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
- [6] CRFID: An RFID system with a cloud database as a back-end server [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 155 - 161
- [8] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [9] Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
- [10] Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548