共 22 条
- [1] Bloom B(1970)Space/time trade-offs in hash coding with allowable errors Commun ACM 13 422-426
- [2] Jüttner A(2005)Magi Á Tree based broadcast in ad hoc networks MONET 10 753-762
- [3] Kang I(2005)Maximizing network lifetime of broadcasting over wireless stationary ad hoc networks MONET 10 879-896
- [4] Poovendran R(2006)Reducing delay and enhancing dos resistance in multicast authentication through multigrade security IEEE J Intell Fuzzy Syst 1 190-204
- [5] Li Q(2008)Mitigating DoS attacks against broadcast authentication in wireless sensor networks ACM Trans Sensor Netw 58 217-224
- [6] Trappe W(2009)Secure collection tree protocol for tamper-resistant wireless sensors Communications in Computer and Information Science 47 53-57
- [7] Ning P(2004)Security in wireless sensor networks Commun ACM 6 29-48
- [8] Liu A(2009)ShortPK: a short-term public key scheme for broadcast authentication in sensor networks ACM Trans Sensor Netw 6 35-62
- [9] Pecho P(2006)Efficient broadcasting protocols for regular wireless sensor networks Wirel Commun Mob Comput 35 54-undefined
- [10] Nagy J(2002)Denial of service in sensor networks Comput undefined undefined-undefined