共 11 条
- [1] BENOR M, 1998, ACM S THEORY COMPUTI
- [2] BLUNDO C, 1999, LNCS, V740
- [3] Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
- [4] Kim YD, 2003, SECOND IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, P131, DOI 10.1109/NCA.2003.1201147
- [6] Naor M, 1999, LECT NOTES COMPUT SC, V1592, P327
- [7] On the utility of distributed cryptography in P2P and MANETs: the case of membership control [J]. 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2003, : 336 - 345
- [8] SAXENA N, 2005, 13 IEEE INT C NETW P
- [9] SAXENA N, 2003, ACM WORKSH SEC AD HO, P104
- [10] SAXENA N, 2004, INT WORKSH HOT TOP P, P101