共 13 条
- [2] Francillon Aurelien., 2007, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, P1, DOI [10.1109/WIOPT.2007.4480051, DOI 10.1109/WIOPT.2007.4480051]
- [4] Jakobsson M., 1998, 5th ACM Conference on Computer and Communications Security, P103, DOI 10.1145/288090.288114
- [5] Latif R, 2009, LECT NOTES COMPUT SC, V5576, P732, DOI 10.1007/978-3-642-02617-1_74
- [6] A public-key infrastructure for key i)istribution in TinyOS based on elliptic curve cryptography [J]. 2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 71 - 80
- [7] National Institute of Standard and Technology, 2001, 80022 NIST
- [10] Wang H, 2006, WMCS200607 COLL WILL