共 13 条
[1]
Abadi D., 2004, Proceedings of the 30th International Conference on Very Large Data Bases Endowment, V30, P1361
[2]
Wearable security services
[J].
21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS,
2001,
:266-271
[3]
DUNKELS A, 2004, WORK IN PROGR SESS 1
[4]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[6]
Kansal A, 2007, PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P547, DOI 10.1109/IPSN.2007.4379718
[7]
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]
Neuman C., 2005, KERBEROS NETWORK AUT
[9]
Analyzing the energy consumption of security protocols
[J].
ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN,
2003,
:30-35
[10]
RUANGCHAIJATUPO.N, 2001, 3 IEEE WORKSH WIR LA