共 43 条
[1]
Key infection: Smart trust for smart dust
[J].
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS,
2004,
:206-215
[2]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[3]
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]
[Anonymous], 1996, Mobile Computing
[5]
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[6]
Modeling and Verifying Ad Hoc Routing Protocols
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:59-74
[7]
Ballardin F, 2011, LECT NOTES COMPUT SC, V6561, P206, DOI 10.1007/978-3-642-19751-2_14
[8]
Basagni S., 2001, MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, P156, DOI 10.1145/501416.501438
[9]
Bertot Y, 2008, LECT NOTES COMPUT SC, V5170, P12, DOI 10.1007/978-3-540-71067-7_3
[10]
Blackshear S., 2010, SAC, P1985