共 21 条
[1]
[Anonymous], 2007, Proceedings of the 2nd ACM symposium on Information, computer and communications security
[4]
Czeskis A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P479
[5]
De Donno D, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P97
[6]
Delfs H., 2007, Introduction to cryptography: principles and applications
[8]
Hoque ME, 2011, INT CONF PERVAS COMP, P102, DOI 10.1109/PERCOM.2011.5767573
[9]
Jain M., 2011, Proc. 17th Annual. Int. Conf. Mob. Comput. Netw. MobiCom '11, P301, DOI DOI 10.1145/2030613.2030647