Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks
暂无分享,去创建一个
[1] Tongtong Li,et al. Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.
[2] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[3] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[4] Minming Li,et al. Approximately optimal trees for group key management with batch updates , 2009, Theor. Comput. Sci..
[5] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[6] C. Mala,et al. Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs , 2014 .
[7] Tang Hong,et al. A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[8] Fangwei Li,et al. A method to defense against cooperative SSDF attacks in Cognitive Radio Networks , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).
[9] Mohamed Othman,et al. Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks , 2014, J. Netw. Comput. Appl..
[10] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[11] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[12] Liming Xie,et al. A QoS routing algorithm for group communications in Cognitive Radio ad hoc networks , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).
[13] Younghan Kim,et al. Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[14] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[15] Sachin Tripathi,et al. Design of efficient ternary-tree based group key agreement protocol for dynamic groups , 2009, 2009 First International Communication Systems and Networks and Workshops.
[16] Abdul Ghafoor,et al. Grouping technique for cooperative spectrum sensing in cognitive radios , 2009, 2009 Second International Workshop on Cognitive Radio and Advanced Spectrum Management.
[17] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[18] Hua-Yi Lin,et al. Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[19] Y. Thomas Hou,et al. Cognitive radio communications and networks: principles and practice , 2012 .
[20] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[21] K. J. Ray Liu,et al. Index of Terms , 2016 .
[22] Feipei Lai,et al. Secure and efficient group key management with shared key derivation , 2009, Comput. Stand. Interfaces.
[23] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[24] Junbeom Hur,et al. Scalable and efficient approach for secure group communication using proxy cryptography , 2012, Wirel. Networks.
[25] Seung-Woo Seo,et al. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users , 2014, IEEE Transactions on Mobile Computing.
[26] Jun Zhang,et al. Performance Analysis of Batch Rekey Algorithm for Secure Group Communications , 2004, PDCAT.
[27] Baocang Wang,et al. Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..
[28] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[29] Muhammad Sher,et al. ECC and Symmetric based Hybrid Authenticated Key Agreement Implementation and Analysis for Body Sensor Networks , 2015 .
[30] C. N. Mathur,et al. Security Issues in Cognitive Radio Networks , 2007 .
[31] Tapas Pandit,et al. eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version) , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[32] Min Wu,et al. Dynamic join-exit amortization and scheduling for time-efficient group key agreement , 2004, IEEE INFOCOM 2004.
[33] Olga Leon,et al. A new cross-layer attack to TCP in cognitive radio networks , 2009, 2009 Second International Workshop on Cross Layer Design.
[34] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[35] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[36] C. Mala,et al. Tree Based Group Key Agreement – A Survey for Cognitive Radio Mobile Ad Hoc Networks , 2014 .
[37] Xiaohua Jia,et al. Causal ordering group communication for cognitive radio ad hoc networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[38] Jiashu Zhang,et al. Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..
[39] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[40] Ian F. Akyildiz,et al. Cognitive Wireless Mesh Networks with Dynamic Spectrum Access , 2008, IEEE Journal on Selected Areas in Communications.
[41] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[42] Shahaboddin Shamshirband,et al. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges , 2015, J. Netw. Comput. Appl..
[43] Il-Min Kim,et al. Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).
[44] Xiaozhuo Gu,et al. Dynamic contributory key management based on Weighted-Join-Exit-Tree , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[45] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[46] David K. Y. Yau,et al. Distributed collaborative key agreement and authentication protocols for dynamic peer groups , 2006, TNET.