共 34 条
[1]
[Anonymous], 2013, P 8 INT C BOD AR NET, P488, DOI [DOI 10.4108/ICST.BODYNETS.2013.253731, 10.4108/icst.bodynets.2013.253731]
[2]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]
Barbosa M, 2012, LECT NOTES COMPUT SC, V7178, P296, DOI 10.1007/978-3-642-27954-6_19
[4]
Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
[6]
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[7]
Fall K, 2003, ACM SIGCOMM COMP COM, V33, P27
[8]
Fan P, 2005, LECT NOTES COMPUT SC, V3738, P32, DOI 10.1007/11561354_5
[9]
Fiore D., 2012, P ACM C COMP COMM SE, P501, DOI 10.1145/2382196.2382250
[10]
Securing m-healthcare social networks: Challenges, countermeasures and future directions
[J].
1600, Institute of Electrical and Electronics Engineers Inc., United States (20)
:12-21