共 50 条
- [31] A Verifiable Dynamic Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS (ICAL), 2012, : 315 - 320
- [32] A Key Management Scheme Based on Double matrix CPK for Mobile Ad Hoc Networks [J]. ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 543 - 548
- [33] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
- [35] A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 905 - 915
- [36] Multi-layer multicast key management with threshold cryptography [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 705 - 715
- [37] A New Stable Clustering Scheme for Highly Mobile Ad Hoc Networks [J]. 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
- [38] Efficient Scalable Clustering Scheme for Pseudolinear Mobile Ad hoc Network [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
- [39] An adaptive multihop clustering scheme for highly mobile ad hoc networks [J]. ISADS 2003: SIXTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2003, : 293 - 300