共 29 条
- [1] Trust-based security for wireless ad hoc and sensor networks [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
- [2] Chen HG, 2007, MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, P603
- [3] Provenance in Databases: Why, How, and Where [J]. FOUNDATIONS AND TRENDS IN DATABASES, 2007, 1 (04): : 379 - 474
- [4] Crosby G. V., 2006, 2 IEEE WORKSH DEP SE
- [5] Dai C, 2008, TECHNICAL REPORT
- [6] Dogan G., 2011, MIL COMM C
- [7] Dogan Gulustan, 2013, PROTRU LEVERAGING PR
- [8] Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
- [9] A survey on the applicability of trust management systems for wireless sensor networks [J]. THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, : 25 - +