Author:
Jiang Xuan,Hu Wenhui,Zhu Sencun,Cao Guohong
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference41 articles.
1. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Advances in cryptology, Proceedings of CRYPTO 92, (pp. 471–486).
2. Brown, T., James, J., & Sethi, A. (2006). Jamming and sensing of encrypted wireless ad hoc networks. In ACM Mobihoc.
3. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Security and Privacy Symposim.
4. Chiang, J. T. & Hu, Y.-C. (2008). Dynamic jamming mitigation for wireless broadcast networks. In IEEE INFOCOM.
5. Danev, B. & Capkun, S. (2009). Transient-based identification of wireless sensor nodes. In ACM/IEEE IPSN.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献