共 50 条
- [1] Link layer security for SAHN protocols [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, WORKSHOPS, 2005, : 279 - 283
- [2] A survey on security in JXTA applications [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1513 - 1525
- [3] Trust management and network layer security protocols [J]. SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
- [4] Trust management and network layer security protocols [J]. SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
- [5] A Security Framework for JXTA-Overlay [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 212 - +
- [6] Persistent interoperable security for JXTA advertisements [J]. CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 354 - 359
- [7] Cryptographic Protocols' Performance and Network Layer Security of RSMAD [J]. 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
- [8] Security in the Internet of Things: A Survey on Application Layer Protocols [J]. 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
- [9] Security of IoT Application Layer Protocols: Challenges and Findings [J]. FUTURE INTERNET, 2020, 12 (03):
- [10] Security issues in routing protocols in MANETs at network layer [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3