共 91 条
[31]
Hashmi Saorsh, 2010, Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), P17, DOI 10.1109/SECURWARE.2010.11
[32]
Huang YA, 2002, INT CON DISTR COMP S, P478
[33]
Istikmal A., 2017, PROC 11 INT C TELECO, P1
[34]
Jaisankar N, 2010, COMM COM INF SC, V70, P217
[35]
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2009, 25 (08)
:926-934
[36]
Jawaligi SS., 2017, WIRELESS SENSOR NETW, V9, P117, DOI [10.4236/wsn.2017.94007, DOI 10.4236/WSN.2017.94007]
[38]
Ji LS, 2001, IEEE INFOCOM SER, P1192, DOI 10.1109/INFCOM.2001.916314
[39]
Khelil A., 2002, Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, P54, DOI DOI 10.1145/570758.570768