共 3 条
- [1] Adaptive security design with malicious node detection in cluster-based sensor networks[J] . Meng-Yen Hsieh,Yueh-Min Huang,Han-Chieh Chao.Computer Communications . 2007 (11)
- [2] Beyond proof-of-compliance: security analysis in trust management[J] . Ninghui Li,John C. Mitchell,William H. Winsborough.Journal of the ACM (JACM) . 2005 (3)
- [3] Behavior-Based trust in wireless sensor network .2 Huang L,Li L,Tan Q. Proc.of the APWeb Workshops 2006 . 2006