共 20 条
[1]
[Anonymous], 2003, P SENSYS, DOI DOI 10.1145/958491.958494
[2]
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[3]
Secure embedded processing through hardware-assisted run-time monitoring
[J].
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS,
2005,
:178-183
[5]
CAO Q, 2008, IN FIELD MAINTENANCE, P457
[6]
Capkun S, 2005, IEEE INFOCOM SER, P1917
[7]
Cerpa A, 2002, IEEE INFOCOM SER, P1278, DOI 10.1109/INFCOM.2002.1019378
[8]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[9]
GU L, 2006, P ACM C EMB NETW SEN, P14
[10]
Enhancing source-location privacy in sensor network routing
[J].
25th IEEE International Conference on Distributed Computing Systems, Proceedings,
2005,
:599-608