[1] 柳立峰, 邹仕洪, 张雷. 基于概率覆盖模型的无线传感器网络密度控制算法[J]. 北京邮电大学学报, 2005, 28(4): 14-17. Liu Lifeng,Zou Shihong,Zhang Lei. A density control algorithm based on probability coverage model in wireless sensor networks[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 48(14): 14-17. [2] 屈玉贵, 翟羽佳, 蔺智挺. 一种新的无线传感器网络传感器放置模型[J]. 北京邮电大学学报, 2004, 27(6): 14-17. Qu Yugui, Zhai Yujia, Lin Zhiting. A novel sensor placement model in wireless sensor network[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(6): 14-17. [3] Perring A, Szewczyk R, Tygar, et al. SPINS: security protocols for sensor networks.2001(2001-03-15). http://ww.ece.cmu.edu/~adrian/projects/mc2001/mc2001.pdf. [4] Hoffstein J, Pipher J, Silverman J. NTRU: a ring-based public key cryptosystem//Buhler J. Algorithmic Number Theory. German: Springer Berlin/Heidelberg, 1998: 267-288. [5] Priit Caru. Practical comparison of fast public-key cryptosystems.2000(2000-07-02). http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/paper/loikkanen-kahc.pdf. [6] Colleen Marie O'Rourke. Efficient NTRU implementation. USA: Worcester Polytechnic, 2002. [7] David H, Bo-Cheng C, Ingrid V. Energy-memory-security tradeoffs in distributed senor networks//Proc International Conference on Ad-hoc Networks and Wireless(ADHOC-Now 2004). German: Springer Berlin/Heidelberg, 2004: 70-81. [8] Sencun Z, Sanjeev S, Sushi J, Leap: efficient security mechanisms for large-scale distributed sensor network.2003(2003-07-01). http://www.cse.psu.edu/szhu/papers/leap.pdf. |