共 16 条
[1]
Secure comparison of encrypted data in wireless sensor networks
[J].
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS,
2005,
:47-53
[2]
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[3]
Barker E., DRAFT NIST SPECIAL P
[4]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[6]
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[10]
Domingo-Ferrer J., 2003, 6 ISC C, P471