共 32 条
[1]
Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
[2]
[Anonymous], 2010, MICAZ WIRELESS MEASU
[3]
[Anonymous], 2010, IMOTE2 HIGH PERFORMA
[4]
Benenson Z, 2006, INT FED INFO PROC, V201, P38
[5]
Black J, 2005, J CRYPTOL, V18, P111, DOI [10.1007/s00145-004-0016-3, 10.1007/S00145-004-0016-3]
[6]
Boyd C, 2004, LECT NOTES COMPUT SC, V3089, P248
[7]
Multicast security: A taxonomy and some efficient constructions
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:708-716
[9]
Random graph theory based connectivity analysis in wireless sensor networks with Rayleigh fading channels
[J].
2007 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS,
2007,
:123-126