共 50 条
- [1] Key revocation for identity-based schemes in mobile ad hoc networks AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 224 - 237
- [2] Identity-based and threshold key management in mobile ad hoc networks 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
- [4] Identity-based key distribution for mobile Ad Hoc networks Frontiers of Computer Science in China, 2011, 5 : 442 - 447
- [5] Identity-based key distribution for mobile Ad Hoc networks FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (04): : 442 - 447
- [6] Identity-Based Threshold Key Management for Ad Hoc Networks PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1753 - 1757
- [7] Survey on Certificateless Key Management Schemes in Mobile Ad Hoc Networks PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 334 - 339
- [8] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
- [9] A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 380 - 400
- [10] Short paper: Limitations of key escrow in identity-based schemes in ad hoc networks FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 403 - 405