共 18 条
- [1] [Anonymous], TECHNICAL REPORT
- [2] [Anonymous], 2015, INT C WIR ALG SYST A
- [3] Chenxi Wang, 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, P3940, DOI 10.1109/HICSS.2002.994531
- [4] Fiege L., 2004, 3 INT WORKSH DISTR E
- [5] Frahim J, 2016, SECURING INTERNET TH
- [6] Hankerson D., 2003, Guide to Elliptic Curve Cryptography
- [7] Ibrahim Maged Ramada, 2016, International Journal of Network Security, V18, P1089
- [8] Mitchell JC, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P201
- [9] Opyrchal L, 2006, INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, P313
- [10] Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications [J]. IEEE ACCESS, 2015, 3 : 1503 - 1511