共 45 条
[1]
Allen C., 1999, RFC, DOI [DOI 10.17487/RFC2246, 10.17487/RFC2246]
[2]
[Anonymous], 1960, J SOC IND APPL MATH
[3]
BALACHEFF B, 2003, TRUSTED COMPUTING PL
[4]
Balfanz D., 2002, NDSS, P1
[5]
BELLARE M, 2001, P ADV CRYPT ASISCRYP
[6]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[7]
Bellovin SM, 1993, P CCS, P244
[8]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[9]
BURNSIDE M, 2002, P PERV COMP PERV AUG
[10]
CAPKUN S, 2003, P ACM S MOB AD HOC N