共 9 条
- [1] Blundo C, 2004, LECT NOTES COMPUT SC, V3142, P234
- [3] BLUNDO C, 1996, LNCS, V1109, P387, DOI DOI 10.1007/3-540-68697-5
- [4] Cover TM, 2006, Elements of Information Theory
- [5] Hong D, 2005, IEEE COMMUN LETT, V9, P759, DOI [10.1109/LCOMM.2005.1496607, 10.1109/LCOMM.2005.08015]
- [6] Liu D., 2003, P 10 ACM C COMP COMM, P231, DOI DOI 10.1145/948109.948141
- [7] More S. M., 2003, ACM WORKSH SURV SELF, P82, DOI DOI 10.1145/1036921.1036930
- [8] Sáez G, 2005, LECT NOTES COMPUT SC, V3796, P340
- [9] Self-healing key distribution with revocation [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 241 - 257