共 34 条
[1]
[Anonymous], 2015, ZIGBEE EXPLOITED GOO
[2]
[Anonymous], 2015, ONLINE AUTHENTICATIO
[3]
Asanghanwa E., 2016, 112015 ATM
[5]
Chen JC, 2005, IEEE COMMUN MAG, V43, pS26
[7]
Dini Gianluca, 2010, IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2010), P58, DOI 10.1109/SUTC.2010.15
[9]
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[10]
Grossschadl J., 2007, P 2 ACM S INF COMP C, P380, DOI DOI 10.1145/1229285.1229334