메뉴 건너뛰기




Volumn 2006 II, Issue , 2006, Pages 411-418

Performance characteristics of region-based group key management in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

GROUP COMMUNICATING SYSTEM; MOBILE AD HOC NETWORKS; NETWORK COMMUNICATION COST; REGION BASED GROUP KEY MANAGEMENT;

EID: 33845412961     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SUTC.2006.1636207     Document Type: Conference Paper
Times cited : (8)

References (10)
  • 3
    • 3042583499 scopus 로고    scopus 로고
    • Secure group communication using robust contributory key agreement
    • Y. Amir, et al., "Secure group communication using robust contributory key agreement" IEEE Trans. on Parallel and Distributed Systems, Vol. 15, No. 5, 2004, pp.468-480.
    • (2004) IEEE Trans. on Parallel and Distributed Systems , vol.15 , Issue.5 , pp. 468-480
    • Amir, Y.1
  • 7
    • 0345427593 scopus 로고    scopus 로고
    • Using AVL trees for fault tolerant group key management
    • Cornell University
    • O. Rodeh, K. Birman, and D. Dolev, "Using AVL Trees for Fault Tolerant Group Key Management," Cornell University, Computer Science, Technical Report 2000-45, 2000.
    • (2000) Computer Science, Technical Report , vol.2000 , Issue.45
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 9
    • 40849093930 scopus 로고    scopus 로고
    • Performance analysis of location-based group membership and data consistency algorithms in mobile ad hoc networks
    • J.W. Wilson and I.R. Chen, "Performance analysis of location-based group membership and data consistency algorithms in mobile ad hoc networks," International Journal of Wireless and Mobile Computing, 2005.
    • (2005) International Journal of Wireless and Mobile Computing
    • Wilson, J.W.1    Chen, I.R.2
  • 10
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area rekeying algorithms for secure wireless group communications
    • C. Zhang, B. DeCleene, J. Kurose, D. Towsley, "Comparison of Inter-Area Rekeying Algorithms for Secure Wireless Group Communications," Performance Evaluation. Vol. 49, No. 1-4, 2002, pp. 1-20.
    • (2002) Performance Evaluation , vol.49 , Issue.1-4 , pp. 1-20
    • Zhang, C.1    DeCleene, B.2    Kurose, J.3    Towsley, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.