共 50 条
- [41] Design and implementation of a MAC scheme for wireless ad-hoc networks based on a cooperative game framework [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4034 - 4038
- [42] Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes [J]. Int. J. Intell. Inf. Database Syst., 2013, 5 (400-413):
- [43] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
- [44] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
- [45] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol [J]. 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
- [46] LAAP: A Learning Automata-based Adaptive Polling Scheme for Clustered Wireless Ad-Hoc Networks [J]. Wireless Personal Communications, 2013, 69 : 841 - 855
- [48] A bi-modal ad-hoc Localization Scheme for Wireless Networks based on RSS and ToF Fusion [J]. 2013 10TH WORKSHOP ON POSITIONING, NAVIGATION AND COMMUNICATION (WPNC), 2013,
- [49] Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 161 - 165
- [50] An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks [J]. Wireless Personal Communications, 2019, 105 : 857 - 876