共 29 条
[1]
[Anonymous], 2002, IEEE WORKSHOP LARGE
[2]
[Anonymous], 2004, P 6 INT WORKSH CRYPT
[3]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[5]
A practical study of transitory master key establishment for wireless sensor networks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:289-299
[6]
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
[J].
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS,
2003,
:397-406
[8]
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[9]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]
DU W, 2005, P 6 ACM INT S MOB AD, P58