共 10 条
[1]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]
CAMTEPE SA, 2005, TR0507 RENSS POL DEP
[3]
Carman D.W., 2000, 00010 NAI
[4]
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[5]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[6]
Panja B, 2006, IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, P384
[8]
Sastry N., 2004, P 3 ACM WORKSH WIR S, P32, DOI DOI 10.1145/1023646.1023654
[10]
Zhu S., 2003, Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, P62, DOI DOI 10.1145/948109.948120