共 51 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2898, P332
[2]
Billington EJ, 2003, MATH APPL, V563, P47
[3]
Blackburn SR, 2008, LECT NOTES COMPUT SC, V5155, P54
[4]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[5]
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
[6]
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[8]
Multicast security: A taxonomy and some efficient constructions
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:708-716
[9]
Chan HW, 2005, IEEE INFOCOM SER, P524
[10]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213