共 78 条
[2]
The invisible node attack revisited
[J].
PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2,
2007,
:686-691
[3]
[Anonymous], 2009, INT J SECURITY NETWO
[4]
[Anonymous], THEORY APPL CRYPTOGR
[5]
[Anonymous], 1 INT S WIR PERV COM
[6]
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[7]
BARUCH A, 2005, 1 INT C SEC PRIV EM, P327
[9]
Burg A., 2003, SEM AD HOC NETW CONC
[10]
Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128