Author:
Zhang Yongguang,Lee Wenke
Reference45 articles.
1. R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 207–216, 1993.
2. D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2002.
3. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
4. J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139–145, 2001.
5. R. Blom. An optimal class of symmetric key generation systems. In Advances in Cryptology, EUROCRYPT’84, LNCS 209, pages 335–338, 1984.
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献