A Reliable Group Key Management Framework Using Fuzzy Logic for MANETs
暂无分享,去创建一个
[1] Sivakumar Ponnusamy,et al. Mobile Agents based Reliable and Energy Efficient Routing Protocol for MANET , 2016 .
[2] Kamal Kumar Chauhan,et al. Securing Mobile Ad hoc Networks:Key Management and Routing , 2012, ArXiv.
[3] Reham Abdellatif Abouhogail,et al. Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .
[4] Byrav Ramamurthy,et al. CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[5] Valérie Issarny,et al. An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[6] Mark Manulis,et al. Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[7] Lotfi A. Zadeh,et al. A Simple View of the Dempster-Shafer Theory of Evidence and Its Implication for the Rule of Combination , 1985, AI Mag..
[8] Jin-Hee Cho,et al. Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.
[9] Omar Cheikhrouhou,et al. Secure Group Communication in Wireless Sensor Networks: A survey , 2016, J. Netw. Comput. Appl..
[10] Hamamache Kheddouci,et al. ECGK: An efficient clustering scheme for group key management in MANETs , 2010, Comput. Commun..
[11] Farokh B. Bastani,et al. Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).
[12] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[13] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[14] Lingling Li,et al. A New Algorithm of Closeness Degree for Fuzzy Pattern Recognition , 2010 .
[15] Omar Cheikhrouhou,et al. Secure Group communication in Wireless Sensor Networks , 2013 .
[16] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[17] Shouhuai Xu,et al. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks , 2006 .
[18] J. Mendel. Fuzzy logic systems for engineering: a tutorial , 1995, Proc. IEEE.
[19] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[20] Xiaoding Wang,et al. Strategy and simulation of trust cluster based key management protocol for ad hoc networks , 2009, 2009 4th International Conference on Computer Science & Education.
[21] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[22] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[23] Radhakrishnan Shanmugasundaram,et al. Authentication in Wireless Sensor Networks Using Dynamic Keying Technique , 2016 .
[24] Gene Tsudik,et al. Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.
[25] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..