共 28 条
[2]
[Anonymous], ACM T EMBEDDED COMPU
[3]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[4]
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]
Chan HW, 2005, IEEE INFOCOM SER, P524
[6]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[8]
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[9]
HESTER L, 2002, P 11 IEEE ICCCN C MI
[10]
HUANG Q, 2003, P 2 ACM INT C WIR SE, P141, DOI DOI 10.1145/941350.941371