共 25 条
- [1] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
- [2] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
- [3] Boutsis I, 2013, INT CONF PERVAS COMP, P103, DOI 10.1109/PerCom.2013.6526720
- [5] Consolvo S, 2008, CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P1797
- [6] Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
- [7] Defending DoS attacks on broadcast authentication in wireless sensor networks [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1653 - +
- [8] Gaonkar S, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P174
- [9] Groat MM, 2011, IEEE INFOCOM SER, P2024, DOI 10.1109/INFCOM.2011.5935010
- [10] Joye M., 2013, LNCS, P111, DOI [DOI 10.1007/978-3-642-39884-1, DOI 10.1007/978-3-642-39884-110]