ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication
暂无分享,去创建一个
[1] Song Ju,et al. A lightweight key establishment in wireless sensor network based on elliptic curve cryptography , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.
[2] Ming Lu. Study on Secret Key Management Project of WSN Based on ECC , 2012, J. Networks.
[3] Eleftheria Makri,et al. Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..
[4] Srinivas Sampalli,et al. A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying , 2008, Int. J. Netw. Secur..
[5] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[6] Hao Wang,et al. A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity , 2011, J. Networks.
[7] V. Sumathy,et al. A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography , 2010, Int. J. Commun. Netw. Syst. Sci..
[8] Hua-Yi Lin,et al. Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Gene Tsudik,et al. CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[11] Mark Manulis,et al. Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[12] Mark Manulis,et al. Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[13] Huan-Chung Lin,et al. A Scalable ID-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks , 2007 .
[14] S.A Vanstone. Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..
[15] Wei Yuan,et al. An Improved Dynamic Password based Group Key Agreement against Dictionary Attack , 2012, J. Softw..
[16] Atul Negi,et al. An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2011, J. Comput..