An efficient key management scheme for secure wireless multicast
暂无分享,去创建一个
K. J. Ray Liu | Wade Trappe | Yan Sun | W. Trappe | Yan Sun | K. Liu
[1] Suresh Singh,et al. RelM: reliable multicast for mobile networks , 1998, Comput. Commun..
[2] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[3] K. J. Ray Liu,et al. Key distribution for secure multimedia multicasts via data embedding , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[4] Prem Dassanayake,et al. User Mobility Modeling and Characterization of Mobility Patterns , 1997, IEEE J. Sel. Areas Commun..
[5] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[6] Stephen S. Rappaport,et al. Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures , 1986, IEEE Transactions on Vehicular Technology.
[7] Fambirai Takawira,et al. Nonclassical traffic modeling and performance analysis of cellular mobile networks with and without channel reservation , 2000, IEEE Trans. Veh. Technol..
[8] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[9] Stephen S. Rappaport,et al. Traffic Model and Performance Analysis for Cellular Mobile Radio Telephone Systems with Prioritized and Nonprioritized Handoff Procedures - Version 2a , 2000 .