共 21 条
- [1] Chao Lv, 2013, J NETW COMPUT APPL, V36, P298
- [3] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks [J]. J. China Univ. Post Telecom., 2006, 2 (31-38): : 31 - 38
- [6] He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
- [9] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388