共 11 条
- [1] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
- [2] Chen Hongsong, 2011, 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES 2011), P286, DOI 10.1109/ICVES.2011.5983830
- [3] Machine-to-Machine Communications: Architectures, Standards and Applications [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02): : 480 - 497
- [4] Kim J. M., 2013, SECURITY COMMUNI FEB
- [5] Kumar A, 2012, INT J SECUR APPL, V6, P19
- [6] Lui Sha, 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), P1
- [7] Lynn B, 2002, IACR CRYPTOLOGY EPRI, V2002, P72
- [8] Sun X., 2012, SECURITY COMMUNI MAY
- [9] Tien-Dung Nguyen, 2010, Proceedings of the 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM 2010), P248
- [10] Yan Zhu, 2013, Wireless Algorithms, Systems, and Applications. 8th International Conference, WASA 2013. Proceedings. LNCS 7992, P42, DOI 10.1007/978-3-642-39701-1_4