共 13 条
- [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
- [3] DENG H., 2004, Ad Hoc Networks, V2, P291
- [4] Deng HM, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P107
- [5] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
- [6] Toward secure key distribution in Truly Ad-Hoc networks [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 342 - 346
- [7] Khalili A., 2009, S APPL INT WORKSH, P342
- [8] Kong JJ, 2001, NETWORK PROTOCOLS, P251, DOI 10.1109/ICNP.2001.992905
- [9] Liu D., 2003, PROC 10 ACM C COMPUT, P231, DOI DOI 10.1145/948109.948141
- [10] Self-securing ad hoc wireless networks [J]. ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 567 - 574