Parallel key management scheme for mobile ad hoc network based on traffic mining
暂无分享,去创建一个
[1] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[2] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[3] Faramarz Fekri,et al. A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[4] Noureldien A. Noureldien,et al. Survey of Mobile Ad hoc Networks Attacks and a New Classification Scheme , 2015 .
[5] I-En Liao,et al. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[6] Lung-Chung Li,et al. Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.
[7] Xing Zhang,et al. EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] A. Vincent Antony Kumar,et al. A secure dominating set based routing and key management scheme in mobile ad hoc network , 2011 .
[10] Sanjay Kumar Madria,et al. A survey of dynamic key management schemes in sensor networks , 2010 .
[11] Mohsen Guizani,et al. An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.
[12] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[13] Jerzy Jaworski,et al. Random key predistribution for wireless sensor networks using deployment knowledge , 2009, Computing.
[14] Rahmat Budiarto,et al. A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .
[15] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[16] Mohsen Guizani,et al. A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..
[17] Bharat K. Bhargava,et al. Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks , 2007, Int. J. Distributed Sens. Networks.
[18] Mohammed J. Zaki,et al. GenMax: An Efficient Algorithm for Mining Maximal Frequent Itemsets , 2005, Data Mining and Knowledge Discovery.
[19] Douglas R. Stinson,et al. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.
[20] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[21] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[22] Chun-Shien Lu,et al. Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[23] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[24] Kefei Chen,et al. A key management protocol with robust continuity for sensor networks , 2009, Comput. Stand. Interfaces.
[25] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[26] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[27] Chun-Shien Lu,et al. A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[28] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[29] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[30] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[31] Adrian Perrig,et al. SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.
[32] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[33] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[34] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[35] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[36] Hsiao-Hwa Chen,et al. Selecting key management schemes for WSN applications , 2012, Comput. Secur..
[37] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[38] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[39] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[40] Mohamed F. Younis,et al. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[41] Erl-Huei Lu,et al. Secured key exchange protocol in wireless mobile ad hoc networks , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[42] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[43] Rodrigo Roman,et al. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.