共 32 条
[1]
Ahmad A, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1608, DOI 10.1109/ICACCI.2014.6968318
[3]
Malicious Node Traceback in Opportunistic Networks Using Merkle Trees
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS,
2015,
:147-152
[4]
[Anonymous], 2012, INT J WIRELESS MOBIL
[5]
[Anonymous], 2006, CHALLENGES PRIVACY S
[6]
[Anonymous], 2011, 2011 P 20 INT C COMP, DOI DOI 10.1109/ICCCN.2011.6006047
[7]
Bhargava B, 2004, IEEE INTELL SYST, V19, P74
[8]
Chen X, 2015, CHINA COMMUN, V12, P117, DOI 10.1109/CC.2015.7114058
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1976, 22 (06)
:644-654