共 27 条
[2]
[Anonymous], 2009, 2009 INT C ULTR TEL
[3]
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[4]
[Anonymous], 2006, TARGET
[5]
Baker D. J., 1981, 2nd International Conference on Distributed Computing Systems, P476
[6]
Braginsky D., 2002, P 1 ACM INT WORKSH W, P22, DOI DOI 10.1145/570738.570742
[7]
On the detection of clones in sensor networks using random key predistribution
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2007, 37 (06)
:1246-1258
[8]
SET: Detecting node clones in sensor networks
[J].
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS,
2007,
:341-350
[10]
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80