Transmission-efficient group-key generation in large dynamic MANET environments
暂无分享,去创建一个
[1] Bharat K. Bhargava,et al. Key distribution and update for secure inter-group multicast communication , 2005, SASN '05.
[2] Dharma P. Agrawal,et al. Distributed key management for dynamic groups in MANETs , 2008, Pervasive Mob. Comput..
[3] C. Pandu Rangan,et al. Identity Based Aggregate Signcryption Schemes , 2009, INDOCRYPT.
[4] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[7] M. Eltoweissy,et al. CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[8] S. Zhu,et al. GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[9] Ren-Junn Hwang,et al. An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..
[10] Raja Datta,et al. A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network , 2011 .
[11] K C Shet,et al. Cluster Based Group Key Management in Mobile Ad hoc Networks , 2009 .
[12] Radha Poovendran,et al. Power proximity based key management for secure multicast in ad hoc networks , 2007, Wirel. Networks.
[13] Olivier Festor,et al. Group Key Management in MANETs , 2008, Int. J. Netw. Secur..
[14] H.T. Friis,et al. A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.
[15] Miao Yu,et al. A scalable key management and clustering scheme for wireless ad hoc and sensor networks , 2008, Future Gener. Comput. Syst..
[16] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[17] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[18] Giovanni Di Crescenzo,et al. Improved topology assumptions for threshold cryptography in mobile ad hoc networks , 2005, SASN '05.