共 50 条
- [22] A centralized key management scheme for hierarchical access control [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
- [23] Multicast Key Management Scheme Based on TOFT [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1030 - +
- [24] Evaluation of Key Management Scheme Based on Identity [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
- [25] A Simple Key Management Scheme based on WiMAX [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 3 - +
- [26] A Key Management Scheme Based on Outsourced Database [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ARTIFICIAL INTELLIGENCE (CAAI 2017), 2017, 134 : 455 - 460
- [27] Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2024, 5 : 315 - 328
- [28] The Key Management Scheme of Wireless Sensor Networks Based on Key Database [J]. ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 710 - 713
- [30] An Efficient Key Management Scheme for Access Control in a User Hierarchy [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 550 - +