暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[2] Yih-Chun Hu,et al. Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[3] Viswanath Tolety,et al. Load Reduction in Ad Hoc Networks Using Mobile Servers , 1999 .
[4] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[5] Dorothy E. Denning,et al. Geo-Encryption: Using GPS to Enhance Data Security , 2003 .
[6] Avishai Wool,et al. On location-restricted services , 1999 .
[7] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[8] Brian D. Noble,et al. Mobile network estimation , 2001, MobiCom '01.
[9] Zygmunt J. Haas,et al. Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[10] J. S. Warner,et al. GPS Spoofing Countermeasures , 2003 .