共 50 条
- [1] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
- [2] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
- [3] Identity-Based Threshold Key Management for Ad Hoc Networks [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1753 - 1757
- [4] Identity-based and threshold key management in mobile ad hoc networks [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
- [5] Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 209 - 213
- [6] Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 565 - 570
- [7] A Novel Detective and Self-organized Certificateless Key Management Scheme in Mobile Ad Hoc Networks [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 443 - 448
- [8] Efficient self-organized key management for mobile ad hoc networks [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2185 - 2190
- [9] Towards a fully self-organized identity-based key management system for MANETs [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 717 - 723