共 10 条
- [1] [Anonymous], 2006, SIAM J COMPUTING
- [2] I know your MAC address: targeted tracking of individual using Wi-Fi [J]. JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (04): : 219 - 227
- [3] Henne Benjamin, 2013, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks,WiSec '13, P95, DOI 10.1145/2462096.2462113
- [4] Analyzing Spoofing Attacks in Wireless Networks [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 398 - +
- [5] Lin Zi., 2012, Financial Cryptography, P73, DOI [10.1007/978-3-642-32946-3_7, DOI 10.1007/978-3-642-32946-3_7]
- [6] Qiu Q, 2009, P INT TECH M I NAVIG, P586
- [7] Saputro W U., 2012, JURNAL KEDOKTERAN KO
- [8] Tippenhauer NO, 2009, MOBISYS'09: PROCEEDINGS OF THE 7TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P29
- [9] Yanxu Zheng, 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), P1, DOI 10.1109/ISSNIP.2015.7106902
- [10] Zhou Ao-Ying, 2011, Chinese Journal of Computers, V34, P1155, DOI 10.3724/SP.J.1016.2011.01155