共 9 条
[1]
Blundo C, 2004, LECT NOTES COMPUT SC, V3142, P234
[3]
BLUNDO C, 1996, LNCS, V1109, P387, DOI DOI 10.1007/3-540-68697-5
[4]
Cover TM, 2006, Elements of Information Theory
[5]
Hong D, 2005, IEEE COMMUN LETT, V9, P759, DOI [10.1109/LCOMM.2005.1496607, 10.1109/LCOMM.2005.08015]
[6]
Liu D., 2003, P 10 ACM C COMP COMM, P231, DOI DOI 10.1145/948109.948141
[7]
More S. M., 2003, ACM WORKSH SURV SELF, P82, DOI DOI 10.1145/1036921.1036930
[8]
Sáez G, 2005, LECT NOTES COMPUT SC, V3796, P340
[9]
Self-healing key distribution with revocation
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:241-257