共 20 条
[1]
Becher A, 2006, 3 INT C SEC PERV COM
[2]
Chakeres ID, 2002, 5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P504, DOI 10.1109/WPMC.2002.1088225
[3]
SET: Detecting node clones in sensor networks
[J].
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS,
2007,
:341-350
[4]
CHOI YS, 2007, P 2007 INT C CONV IN, P400
[5]
CONTI M, 2007, P 8 ACM INT S MOB AD
[6]
Conti M, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P214
[7]
DING W, 2010, P 2010 IEEE SENS APP
[8]
DU XJ, 2008, IEEE INT C COMM 2008
[9]
Hartung C., 2005, NODE COMPROMISE SENS
[10]
HUANG CT, 2006, ADV INF SEC, P1