Small worlds and the security of ubiquitous computing
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Carson C. Chow,et al. Small Worlds , 2000 .
[3] B. Hayes. Graph Theory in Practice: Part II , 2000, American Scientist.
[4] Ramesh Govindan,et al. Using the small-world model to improve Freenet performance , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[5] Gesine Reinert,et al. Small worlds , 2001, Random Struct. Algorithms.
[6] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[7] J. Kleinfeld. COULD IT BE A BIG WORLD AFTER ALL? THE "SIX DEGREES OF SEPARATION" MYTH , 2002 .
[8] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[9] Frank Siegemund,et al. A Context-Aware Communication Platform for Smart Objects , 2004, Pervasive.
[10] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[11] Harald Vogt,et al. Integrity preservation for communication in sensor networks , 2004 .
[12] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[13] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Harald Vogt,et al. Exploring Message Authentication in Sensor Networks , 2004, ESAS.
[15] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[16] Olaf Sporns,et al. Networks analysis, complexity, and brain function , 2002 .
[17] M. V. Valkenburg. Network Analysis , 1964 .
[18] O. Sporns. Network Analysis , Complexity , and Brain Function , 2002 .