A hierarchical key management scheme for secure group communications in mobile ad hoc networks
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[2] Steve F. Russell. Wireless network security for users , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[3] S.K. Dhurandher,et al. Weight based adaptive clustering in wireless ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[4] Yueh-Min Huang,et al. Group keys and the multicast security in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[5] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[6] Joseph P. Macker,et al. Mobile ad hoc networking and the IETF , 1998, MOCO.
[7] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[8] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[9] Yongdae Kim,et al. Secure Group Communication Using Robust Contributory Key Agreement , 2001 .
[10] Elena Pagani,et al. An on-demand shared tree with hybrid state for multicast routing in ad hoc mobile wireless networks , 1999, Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC'99). Group Communications (IWGC). Internet '99 (IWI'99). Industrial Applications on Network Computing (INDAP). Multime.
[11] Henry L. Owen,et al. Wireless intrusion detection and response: a classic study using main-in-the-middle attack , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[12] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[13] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[14] Josef Pieprzyk,et al. Multiparty key agreement protocols , 2000 .
[15] Halim Fathoni,et al. DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION ENGINEERING , 2008 .
[16] Joseph P. Macker,et al. Mobile ad hoc networking and the IETF , 2006, MOCO.
[17] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[18] Liu Jing. Key Management and Access Control for Large Dynamic Multicast Groups , 2002 .
[19] Prashant Sharma,et al. Secure multicast model for ad-hoc military networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[20] Chen-Khong Tham,et al. A novel routing protocol using mobile agents and reactive route discovery for ad hoc wireless networks , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).
[21] Jing Liu,et al. Key management and access control for large dynamic multicast group , 2002, Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002).
[22] Jin-Hee Cho,et al. Performance characteristics of region-based group key management in mobile ad hoc networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[23] Gene Tsudik,et al. CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[24] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[25] Panlong Yang,et al. Security management in hierarchical ad hoc network , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).
[26] Ruay-Shiung Chang,et al. Weight-based clustering multicast routing protocol for mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[27] Chin-Chen Chang,et al. An efficient session key generation protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[28] Dharma P. Agrawal,et al. Level-based key establishment for multicast communication in mobile ad hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[29] Hassan Taheri,et al. A light-weight contention-based clustering algorithm for wireless ad hoc networks , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[30] Shueng-Han Gary Chan,et al. Key management approaches to offer data confidentiality for secure multicast , 2003 .