共 25 条
[2]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[3]
Bernstein DJ, 2006, MATH COMPUT, V76, P389
[4]
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
[5]
BONEH D., 2002, CRYPTOBYTES, V5, P1
[6]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[7]
Cheng Y., 2005, P 2 IEEE INT C MOB A
[9]
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[10]
DU W, 2005, P 6 ACM INT S MOB AD, P58