共 50 条
- [31] Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks [J]. CONTEMPORARY COMPUTING, 2012, 306 : 335 - 346
- [32] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks [J]. Wireless Networks, 2010, 16 : 2169 - 2178
- [34] A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS [J]. SAIEE AFRICA RESEARCH JOURNAL, 2006, 97 (01): : 82 - 92
- [36] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
- [37] Energy and Mobility Based Group Key Management in Mobile Ad Hoc Networks [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
- [38] A Group-Based Key Management Protocol for Mobile Ad Hoc Networks [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4305 - +
- [39] Distributed symmetric key management for mobile ad hoc networks [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
- [40] A composite key management scheme for mobile ad hoc networks [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584