共 25 条
[1]
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]
Anderson R., 1997, TECHNICAL REPORT
[3]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[4]
[Anonymous], 2006, 6020006004 CROSSB TE
[5]
Baek J, 2008, PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, P95
[6]
Becher A, 2006, LECT NOTES COMPUT SC, V3934, P104
[7]
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[8]
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
[9]
Bellare Mihir., 2006, P 13 ACM C COMPUTER, P380
[10]
Benenson Z, 2008, CRYPTOL INF SEC SER, V1, P22