共 23 条
- [1] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
- [2] SATMC: A SAT-based model checker for security protocols [J]. LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 : 730 - 733
- [3] Arthur W., 2015, A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security, V1st
- [4] Basin D, 2003, LECT NOTES COMPUT SC, V2808, P253
- [6] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
- [7] Random key predistribution schemes for sensor networks [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
- [8] Chevalier Y., 2004, Workshop on Specification and Automated Processing of Security Requirements-SAPS'2004, P13
- [9] On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 580 - 585
- [10] Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548