共 53 条
[2]
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]
[Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
[4]
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[5]
[Anonymous], **DROPPED REF**
[6]
Becher A, 2006, LECT NOTES COMPUT SC, V3934, P104
[7]
BETTSTETTER C, 2002, P 3 ACM INT S MOB AD, P80, DOI DOI 10.1145/513800.513811
[8]
Bettstetter Christian., 2003, PROC ACM MSWIM, P28
[9]
On the detection of clones in sensor networks using random key predistribution
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2007, 37 (06)
:1246-1258
[10]
Capkun S, 2005, IEEE INFOCOM SER, P1917