A secure group communication approach for tactical network environments
暂无分享,去创建一个
Cesare Stefanelli | Filippo Poltronieri | Mauro Tortonesi | Niranjan Suri | Roberto Fronteddu | Matthew Paulini | James Milligan
[1] Cesare Stefanelli,et al. Exploring value-of-information-based approaches to support effective communications in tactical networks , 2015, IEEE Communications Magazine.
[2] Cesare Stefanelli,et al. Communications middleware for tactical environments: Observations, experiences, and lessons learned , 2009, IEEE Communications Magazine.
[3] Spyros Galanis,et al. The Value of Information Under Unawareness , 2015, J. Econ. Theory.
[4] John Schultz,et al. Collaborative applications at the Tactical Edge through resilient group dissemination in DTN , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[5] Cesare Stefanelli,et al. Peer-to-peer communications for tactical environments: Observations, requirements, and experiences , 2010, IEEE Communications Magazine.
[6] Sheila Frankel,et al. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap , 2011, RFC.
[7] B. Parvathavarthini,et al. An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management , 2017, Wirel. Pers. Commun..
[8] Nistala V. E. S. Murthy,et al. Provably secure group key agreement protocol based on ECDH with integrated signature , 2016, Secur. Commun. Networks.
[9] Emin Anarim,et al. A secure and efficient group key agreement approach for mobile ad hoc networks , 2017, Ad Hoc Networks.
[10] H. Seifert,et al. Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management , 2008 .
[11] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[12] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[13] V. S. Janani,et al. Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks , 2017, Wirel. Pers. Commun..
[14] Gene Tsudik,et al. An architecture for key management in hierarchical mobile ad-hoc networks , 2004, Journal of Communications and Networks.
[15] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..