Session Key Generation for a Group Call and Device for Security Control
暂无分享,去创建一个
[1] Yuan Ning. Securing AD-HOC networks using IPSec , 2006 .
[2] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[3] Luigi Atzori,et al. IP Telephony over Mobile Ad Hoc Networks: Joint Routing and Playout Buffering , 2008, 2008 IEEE International Conference on Communications.
[4] T.H. Tran,et al. Proactive Multicast-Based IPSEC Discovery Protocol and Multicast Extension , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[5] Mark Metcalf. Project MESA: advanced mobile broadband communications for public safety applications , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[6] M. Bereschinsky,et al. Securing ad-hoc networks using IPsec , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[7] Hung-Min Sun,et al. An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[8] Bobby Bhattacharjee,et al. Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] T. Aurisch. Using key trees for securing military multicast communication , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[10] Apostolis K. Salkintzis. Evolving public safety communication systems by integrating WLAN and TETRA networks , 2006, IEEE Communications Magazine.
[11] Byrav Ramamurthy,et al. CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[12] T. Aurisch. Optimization techniques for military multicast key management , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[13] X. Liu. An architecture of security control in sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.
[14] Jorma Ylinen,et al. A Proposal to Improve IKEv2 negotiation , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).
[15] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[16] Jim Burns,et al. A Distributed Hierarchical Policy Management System for Security Control over Tactical Mobile Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[17] Brian Haberman,et al. Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.