[1]
Shahbazi Saeed, Harwood Aaron, Karunasekera Shanika, Achieving ubiquitous network connectivity using an RFID tag-based routing protocol, Proceedings of the 2008 14th IEEE International Conference on Parallel and Distributed Systems, pp.391-398.
DOI: 10.1109/icpads.2008.29
Google Scholar
[2]
Zuniga Marco, Hauswirth Manfred, Hansel: Distributed localization in passive wireless environments, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON (2009).
DOI: 10.1109/sahcn.2009.5168937
Google Scholar
[3]
Cabrera Altamirano Iván, Rodríguez Henríquez Francisco, A scalable intelligent room based on wireless sensor networks and RFIDs , Program and Abstract Book - 2010 7th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2010, pp.434-439.
DOI: 10.1109/iceee.2010.5608607
Google Scholar
[4]
Lu Xu, The research on the cluster-based RFID wireless sensor network routing protocol, PHD thesis of Guangdong University of Uechnology, (2009).
Google Scholar
[5]
Madan B, Goševa-Popstojanova K, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In: Proc. of the Int'l Conf. on Dependable Systems and Networks (DSN 2002). Washington: IEEE Computer Society, 2002. 505−514.
DOI: 10.1109/dsn.2002.1028941
Google Scholar
[6]
Hu Hanping, Chen Xiang, Zhang Baoliang, Guo Wenxuan, An Approach to Measure and Evaluate the Network Security, journal of software , 2005 Vol. 16 No. 11, p.1939-(1945).
DOI: 10.1109/ipdps.2005.46
Google Scholar
[7]
Chen Xiuzhen, Zhen Qinghua, Guan Xiaohong, Lin Chengguang, Quantitative Hierarchical Threat Evaluation Model for Network Security, Journal On Communications, Vol. 17, No. 4, April 2006, p.885−897.
Google Scholar
[8]
Pan Haijun, Lu Kuijun, Wu Chaohui, Research of Trust Quantification Based on Grid System , Application Research Of Computers, 2005. 10, pp.49-55.
Google Scholar
[9]
Zhou Yan, The quantification-based estimation and fusion of target states in wireless sensor network, PHD thesis of Shanghai Jiao Tong Uniersity, (2010).
Google Scholar
[10]
LU Jun, RUAN Qiu—qi, Quantified Cost-Balanced Routing for Overlay Multicast, Chinese Journal Of Electronics, 2006 Vo. l34 No. 7, pp.1316-1320.
Google Scholar
[11]
Yang Guang, Research on Secure Routing Protocols for Wireless Sensor Networks, PHD thesis of Harbin Engineering University, (2009).
Google Scholar
[12]
Zhang Hong Bin, Yang Chao, Ma Jian Feng, Adjoining trust based routing security assessment, Journal Of JiLin University (Engineering And Technology Edition), Vol. 39 No. 2 (2009).
Google Scholar