共 18 条
[2]
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]
[Anonymous], 2003, Proceedings of the 10th ACM conference on Computer and communications security
[4]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[5]
Choi SJ, 2005, LECT NOTES COMPUT SC, V3823, P1088
[7]
Eschenauer L., 2002, P 9 ACM C COMP COMM, P41, DOI DOI 10.1145/586110.586117
[8]
HU Y, 2003, IEEE INFOCOM 03
[9]
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[10]
Kumanduri R, 1998, NUMBER THEORY COMPUT, P479