共 15 条
[1]
[Anonymous], 1998, INTERNET BESIEGED CH
[2]
Balfanz D., 2002, NDSS, P1
[3]
Brands Stefan, 1993, Proceedings of EUROCRYPT, P344, DOI DOI 10.1007/3-540-48285-7_30
[4]
CAPKUN S, IN PRESS IEEE J SELE
[5]
Corner M.D., 2002, P 8 ANN INT C MOB CO, P1, DOI [https://doi.org/10.1145/570645.570647, DOI 10.1145/570645.570647]
[6]
GABBER E, 1998, P 5 ACM C COMP COMM, P142
[7]
HU Y, 2003, P INFOCOM
[8]
Kindberg T, 2003, LECT NOTES COMPUT SC, V2851, P44
[9]
Context authentication using constrained channels
[J].
FOURTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS,
2002,
:14-21
[10]
Lazos L, 2005, 2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P324