Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications
暂无分享,去创建一个
[1] Marvin A. Sirbu,et al. Pricing Multicast Communication: A Cost-Based Approach , 2001, Telecommun. Syst..
[2] F. Rico-Novella,et al. Improved LKH for batch rekeying in multicast groups , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[3] Seung-Woo Seo,et al. Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..
[4] Sanjoy Paul,et al. Multicasting on the Internet and its Applications , 1998, Springer US.
[5] Kevin C. Almeroth,et al. Collecting and modeling the join/leave behavior of multicast group members in the MBone , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.
[6] Francisco Rico-Novella,et al. Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[7] Zongkai Yang,et al. An efficient batch rekeying scheme based on one-way function tree , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..
[8] Douglas S. Reeves,et al. Evaluation of multicast routing algorithms for real-time communication on high-speed networks , 1995 .
[9] Maziar Nekovee,et al. Sensor networks on the road: the promises and challenges of vehicular ad hoc networks and grids , 2005 .
[10] Seung-Woo Seo,et al. Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..
[11] Seung-Woo Seo,et al. RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications , 2011, IEEE Journal on Selected Areas in Communications.
[12] J. Bibb Cain,et al. Performance and Resource Cost Comparisons for the CBT and PIM Multicast Routing Protocols , 1997, IEEE J. Sel. Areas Commun..
[13] Dong Young Lee,et al. Protocol design for scalable and reliable group rekeying , 2001, SPIE ITCom.
[14] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[15] Azim Eskandarian,et al. Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.
[16] Seung-Woo Seo,et al. Optimizing the Batch Mode of Group Rekeying: Lower Bound and New Protocols , 2010, 2010 Proceedings IEEE INFOCOM.
[17] K. C. Almeroth,et al. Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .
[18] K. J. Ray Liu,et al. A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.
[19] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[20] Andry Rakotonirainy,et al. Empirical IEEE 802.11p performance evaluation on test tracks , 2012, 2012 IEEE Intelligent Vehicles Symposium.
[21] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[22] David L. Mills,et al. Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010, RFC.
[23] K. J. Ray Liu,et al. Hierarchical group access control for secure multicast communications , 2007, TNET.