共 20 条
[2]
ALARIFI A, 2006, SASN 06 P 4 ACM WORK, P101
[3]
[Anonymous], CONT CRYPTOLOGY SCI
[4]
[Anonymous], C COMP COMM SEC
[5]
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[6]
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[7]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[8]
CHAN AC, 2004, P IEEE INT C COMM IC, V6, P3743
[9]
Random key predistribution schemes for sensor networks
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:197-213
[10]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548