A novel framework of secure network management for wireless and mobile networks
暂无分享,去创建一个
[1] Phu Dung Le,et al. Group Key Management in Wireless Networks Using Session Keys , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[2] Edward J. Delp,et al. A new secure group key management scheme for multicast over wireless cellular networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[3] Kwang-Hui Lee. A group communication protocol architecture for distributed network management systems , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[4] James Bret Michael,et al. Secure group management in large distributed systems: what is a group and what does it do? , 1999, NSPW '99.
[5] Dong Hoon Lee,et al. Secure and efficient key management for dynamic multicast groups , 2001, OPSR.
[6] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[7] M. Mundy,et al. Adaptive Multicast Key Management for Tactical Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[8] Ludwig Seitz,et al. Secure communication for ad-hoc, federated groups , 2008, IDtrust '08.
[9] Bruno Studer. Secure Network Management Integration of Security Mechanisms into Network Management Protocols , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.
[10] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Azzedine Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[12] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .
[13] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks: Boukerche/Mobile , 2008 .
[14] Yiling Wang,et al. Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[15] K.J.R. Liu,et al. JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management , 2006, IEEE/ACM Transactions on Networking.
[16] Miss Laiha Mat Kiah,et al. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).
[17] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[18] Yung-Fa Huang,et al. Hierarchy-based key management for secure group communications in mobile ad hoc networks , 2007, IWCMC.
[19] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[20] Su-Jin Lee,et al. Multicast Session Management and QoS Management for Multicast Group Communications , 2008, 2008 International Conference on Information Networking.
[21] Forouzan Golshani,et al. A new framework for secure network management , 1997, Proceedings of Sixth International Conference on Computer Communications and Networks.
[22] Xining Li,et al. Large Scale Deployment a Mobile Agent Approach to Network Management , 2008, Seventh International Conference on Networking (icn 2008).
[23] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[24] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[25] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.