共 11 条
[1]
Basilico N(2014)Security games for node localization through verifiable multilateration IEEE Transactions on Dependable and Secure Computing 11 72-85
[2]
Gatti N(2010)Improving wireless physical layer security via cooperating relays IEEE Transactions on Signal Processing 58 1875-1888
[3]
Monga M(2009)Key establishment schemes against storage-bounded adversaries in wireless sensor networks IEEE Transactions on Wireless Communications 8 1218-1222
[4]
Sicari S(undefined)undefined undefined undefined undefined-undefined
[5]
Dong L(undefined)undefined undefined undefined undefined-undefined
[6]
Han Z(undefined)undefined undefined undefined undefined-undefined
[7]
Petropulu AP(undefined)undefined undefined undefined undefined-undefined
[8]
Poor HV(undefined)undefined undefined undefined undefined-undefined
[9]
Tsai SC(undefined)undefined undefined undefined undefined-undefined
[10]
Tzeng WG(undefined)undefined undefined undefined undefined-undefined