共 50 条
- [1] On communication security in wireless ad-hoc sensor networks [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 139 - 144
- [2] The resurrecting duckling: Security issues for ad-hoc wireless networks [J]. SECURITY PROTOCOLS, 2000, 1796 : 172 - 182
- [4] Coverage in wireless ad-hoc sensor networks [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 3174 - 3178
- [5] Mobility increases the capacity of ad-hoc wireless networks [J]. IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 1360 - 1369
- [6] Capacity, delay and mobility in wireless ad-hoc networks [J]. IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1553 - 1563
- [7] Multigrade Security Monitoring for Ad-Hoc Wireless Networks [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 523 - 533
- [8] Sensor Disposition Problem in Wireless Ad-Hoc Sensor Networks [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 485 - 493
- [9] Coverage problems in wireless ad-hoc sensor networks [J]. IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 1380 - 1387
- [10] Scheduling algorithms for wireless ad-hoc sensor networks [J]. GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 6 - 10