共 50 条
- [31] Constant-round password-based group key generation for multi-layer ad-hoc networks SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 3 - 17
- [32] A Verifiable Dynamic Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network 2012 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS (ICAL), 2012, : 315 - 320
- [33] A Key Management Scheme Based on Double matrix CPK for Mobile Ad Hoc Networks ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 543 - 548
- [34] A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 905 - 915
- [36] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
- [37] A New Stable Clustering Scheme for Highly Mobile Ad Hoc Networks 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
- [38] Multi-layer multicast key management with threshold cryptography SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 705 - 715
- [39] Efficient Scalable Clustering Scheme for Pseudolinear Mobile Ad hoc Network 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
- [40] An adaptive multihop clustering scheme for highly mobile ad hoc networks ISADS 2003: SIXTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2003, : 293 - 300