A secure hierarchical key management scheme in mobile ad hoc networks

被引:0
|
作者
Shi, Rong-Hua [1 ]
Yuan, Qian [1 ]
机构
[1] School of Information Science and Engineering, Central South University, Changsha 410083, China
关键词
Mobile ad hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:201 / 206
相关论文
共 50 条
  • [1] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 560 - 577
  • [2] A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    Wang, Nen-Chung
    Fang, Shian-Zhang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1667 - 1677
  • [3] A secure group key management scheme in mobile ad hoc networks
    Li, J
    Cui, GH
    Fu, XQ
    Liu, ZY
    Su, L
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1156 - 1159
  • [4] Distributed Hierarchical Key Management Scheme in Mobile Ad Hoc Networks
    Wang, Fei
    Yu, F. Richard
    Srinivasan, Anand
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1958 - 1962
  • [5] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
    Wang, Fei
    Tang, Helen
    Yu, F. Richard
    Mason, Peter C.
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
  • [6] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [7] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [8] A mobility management scheme for hierarchical mobile Ad hoc networks
    Kai Wen
    Wei Guo
    Xiao, Bailong
    [J]. 2006 6TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS PROCEEDINGS, 2006, : 671 - +
  • [9] Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis
    Joshi D.
    Namuduri K.
    Pendse R.
    [J]. EURASIP Journal on Wireless Communications and Networking, 2005 (4) : 579 - 589
  • [10] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584