共 17 条
- [1] Adekunle AA, 2010, LECT NOTES COMPUT SC, V6074, P375
- [2] On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques [J]. THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2009, : 419 - 424
- [3] [Anonymous], 1998, SKIPJ KEA ALG SPEC V
- [4] [Anonymous], 2004, NIST MODES OPERATION
- [5] [Anonymous], 2001, P 8 ACM C COMP COMM
- [6] [Anonymous], SENSYS 04
- [7] Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
- [8] Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
- [9] Doomun MR, 2008, INT J COMPUT SCI NET, V8, P1
- [10] Jaechul Sung, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P103