共 25 条
- [1] [Anonymous], 2008, PRINCIPLES DIGITAL C
- [2] Dehnie Sintayehu, 2007, 2007 IEEE Sarnoff Symposium, P1, DOI 10.1109/SARNOF.2007.4567377
- [3] Dehnie S., 2008, P IEEE MILCOM NOV, P1
- [4] Detecting malicious behavior in cooperative diversity [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
- [6] Fine-grained network time synchronization using reference broadcasts [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 147 - 163
- [9] Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1224 - 1232
- [10] Khalaf T. A., 2008, P IEEE MILCOM NOV, P1