Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 277-281.
Previous Articles Next Articles
PAN Zhong-qiang and CHANG Xin-feng
[1] 黄梅根,常新峰.一种基于蒙特卡罗法的无线传感器网络移动节点定位算法研究[J].传感技术学报,2010,3(5):562-566 [2] Ratnasamy S,Karp B,Yin L,et al.GHT:a Geographic Hash Table for Data-Centric Storage[C]∥Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications.2002:78-87 [3] Ghose A,Grossklags J,Chuang J.Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks Mobile Data Management[C]∥Lecture Notes in Computer Science.2003:45-62 [4] Newsome J,Shi E,Song D,et al.The Sybil Attack in Sensor Networks:Analysis &Defenses[C]∥Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks.2004:259-268 [5] Parno B,Perrig A,Gligor V.Distributed Detection of Node Replication Attacks in Sensor Networks[J].IEEE Symposium on Security and Privacy.2005:49-63 [6] Peng T,Leckie C,Ramamohanarao K.Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems[J].ACM Comput.Surv.,2007,39(1) [7] Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654 [8] Min S,Sencun Z,Wensheng Z,et al.pDCS:Security and Privacy Support for Data-Centric Sensor Networks[J].IEEE Transactions on Mobile Computing,2009,8(8):1023-1038 [9] Eltoweissy M,Heydari M H,Morales L,et al.CombinatorialOptimization of Group Key Management[J].Journal of Network and Systems Management,2004,12(1):33-50 [10] Younis M F,Ghumman K,Eltoweissy M.Location-Aware Combinatorial Key Management Schemefor Clustered Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2006,17(8):865-882 [11] Alzaid H,Foo E.A taxonomy of secure data aggregation inwireless sensor networks[J].International Journal of Communication Networks and Distributed Syetems,2012,8(1):101-148 [12] 程芳权,彭智勇.可信云存储环境下支持访问控制的密钥管理[J].计算机研究与发展,2013,0(8):1613-1627 |
No related articles found! |
|