A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks
暂无分享,去创建一个
[1] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Yuliang Zheng. Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes , 1998 .
[4] Xiaoyan Hong,et al. C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[5] Gene Tsudik,et al. CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[6] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[7] Xiaoyan Hong,et al. UAV aided intelligent routing for ad-hoc wireless network in single-area theater , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[8] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[9] Xiaoyan Hong,et al. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[10] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[11] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[13] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[14] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[15] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[16] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[17] Yongdae Kim,et al. Exploring robustness in group key agreement , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[18] Yongdae Kim,et al. On the performance of group key agreement protocols , 2004, TSEC.