共 26 条
[1]
Ahn L.V., 2003, 10 ACM C COMP COMM S, P112
[2]
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:74-83
[3]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[4]
Cook S.A., 1971, P 3 ANN ACM S THEOR, P151, DOI DOI 10.1145/800157.805047
[5]
Deng J., 2004, IEEE 2014 INT C DEP
[6]
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
[7]
DU W, 2003, 10 ACM C COMP COMM S
[8]
Eschenauer L., 2002, C COMP COMM SEC CCS
[10]
Guan Y., 1999, 1999 IEEE MIL COMM C