-
1
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
Amir Y., Kim Y., Nita-Rotaru C., Schultz J.L., Stanton J., and Tsudik G. Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems May (2004) 468-480
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, Issue.May
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.L.4
Stanton, J.5
Tsudik, G.6
-
2
-
-
0242414397
-
Key management approaches to offer data confidentiality for secure multicast
-
Chan K.-C., and Chan S.-H. Key management approaches to offer data confidentiality for secure multicast. IEEE Network October (2003) 30-39
-
(2003)
IEEE Network
, Issue.October
, pp. 30-39
-
-
Chan, K.-C.1
Chan, S.-H.2
-
3
-
-
1642635188
-
-
Chang, C.-C., Chung, C.-Y., 2003. An efficient session key generation protocol. In: Proceedings of the 2003 IEEE International Conference on Communication Technology, Beijing, China, April 9-11, pp. 203-207.
-
-
-
-
4
-
-
33845412961
-
-
Chen, I.-R., Cho, J.-H., Wang, D.-C., 2006. Performance characteristics of region-based group key management in mobile ad hoc networks. In: Proceedings of the IEEE International Conference on Sensor Networks, vol. 1, June, pp. 411-419.
-
-
-
-
5
-
-
84943265930
-
-
Chiang, T.-C., Huang, Y.-M., 2003. Group keys and the multicast security in ad hoc networks. In: Proceedings of the 2003 IEEE International Conference on Parallel Processing Workshops, Kaohsiung, Taiwan, ROC, October 6-9, pp. 385-290.
-
-
-
-
6
-
-
21644478900
-
-
Choudhary, M., Sharma, P., Sanghi, D., 2004. Secure multicast model for ad-hoc military networks. In: Proceedings of the 12th IEEE International Conference on Networks, Singapore, November 16-19, pp. 683-688.
-
-
-
-
7
-
-
27644528961
-
-
Dhurandher, S.K., Singh, G.V., 2005. Weight based adaptive clustering in wireless ad hoc networks. In: Proceedings of the 2005 IEEE International Conference on Personal Wireless Communications, New Delhi, India, January 23-25, pp. 95-100.
-
-
-
-
8
-
-
54349093602
-
-
Huang, C.-C., Chang, R.-S., Guo, M.-H., 2003. Weight-based clustering multicast routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE Conference on Wireless Communications and Networking, New Orleans, LA, USA, March 16-20, pp. 1112-1117.
-
-
-
-
9
-
-
0030261758
-
-
Jablon, P.D., 1996. Strong password-only authenticated key exchange. In: Proceedings of the 1996 Computer Communications, New York, USA, October, pp. 5-26.
-
-
-
-
10
-
-
84963704200
-
-
Liu, J., Zhou, M., 2002. Key management and access control for large dynamic multicast group. In: Proceedings of the 4th IEEE Conference on International Workshop, Newport Beach, CA, USA, June 26-28, pp. 121-128.
-
-
-
-
12
-
-
84890485320
-
-
Marwaha, S., Chen, K.T., Srinivasan, D., 2002. A novel routing protocol using mobile agents and reactive route discovery for ad hoc wireless networks. In: Proceedings of the 10th IEEE International Conference on Networks, Singapore, August 27-30, pp. 311-316.
-
-
-
-
13
-
-
84904888755
-
-
Mirkovic, J., Prier, G., Reiher, P., 2002. Attack DDoS at the source. In: Proceedings of the 2002 IEEE International Conference on Network Protocol, Paris, France, November 12-15, pp. 312-321.
-
-
-
-
15
-
-
11244345395
-
-
Mukherjee, A., Gupta, M., Hongmei, D., Agrawal, D.P., 2004. Level-based key establishment for multicast communication in mobile ad hoc networks. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Barcelona, September 5-8, pp. 2871-2875.
-
-
-
-
16
-
-
0010946219
-
-
Pagani, E., Rossi, G.P., 1999. An on-demand shared tree with hybrid state for multicast routing in ad hoc mobile wireless networks. In: Proceedings of the 1999 IEEE International Workshop on Parallel Proceeding, Aizu-Wakamatsu City, Japan, September 21-24, pp. 4-9.
-
-
-
-
17
-
-
33646552392
-
-
Patwardhan, A., Parker, J., Joshi, A., Lorga, M., Kaygiannis, T., 2005. Secure routing and intrusion detection in ad hoc networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, USA, March 8-12, pp. 191-199.
-
-
-
-
19
-
-
9744282769
-
-
Purtoosi, R., Taheri, H., Mohammadi, A., Foroozan, F., 2004. A light-weight contention-based clustering algorithm for wireless ad hoc networks. In: Proceedings of the IEEE International Conference on Computers and Information Technology, Wuhan, China, September 14-16, pp. 627-632.
-
-
-
-
20
-
-
0345565893
-
A survey of key management for secure group communication
-
Rafaeli S., and Hutchison D. A survey of key management for secure group communication. ACM Computing Surveys (CSUR) September (2003) 309-329
-
(2003)
ACM Computing Surveys (CSUR)
, Issue.September
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
21
-
-
84961777801
-
-
Russell, S.F., 2001. Wireless network security for users. In: Proceedings of the 2001 International Conference on Coding and Computing, Las Vegas, USA, April 2-4, pp. 172-177.
-
-
-
-
22
-
-
4544317724
-
-
Schmoyer, T.R., Lin, Y.X., Owen, H.L., 2004. Wireless intrusion detection and response: a classic study using main-in-the-middle attack. In: Proceedings of the 2004 International Conference on Wireless Communications and Networking (WCNC), Atlanta, USA, March 21-25, pp. 883-888.
-
-
-
-
23
-
-
0029720059
-
-
Steiner, M., Tsudik, G., Waidner, M., 1996. Diffie-Hellman key distribution extended to group communication. In: Proceedings of the Third ACM Conference on Computer and Communications Security, New Delhi, India, March, pp. 31-37.
-
-
-
-
24
-
-
0031629148
-
-
Steiner, M., Tsudik, G., Waidner, M., 1998. CLIQUES: a new approach to group key agreement. In: Proceedings of the 18th IEEE International Conference on Distributed Computing System, Amsterdam, Netherlands, May 26-29, pp. 380-387.
-
-
-
-
25
-
-
34547815211
-
A secure group communication protocol for ad hoc wireless networks
-
Advances in Wireless Ad Hoc and Sensor Networks and Mobile Computing, Springer
-
Tseng Y.-M., Yang C.-C., and Liao D.-R. A secure group communication protocol for ad hoc wireless networks. Advances in Wireless Ad Hoc and Sensor Networks and Mobile Computing. Book Series Signal and Communication Technology (2007), Springer
-
(2007)
Book Series Signal and Communication Technology
-
-
Tseng, Y.-M.1
Yang, C.-C.2
Liao, D.-R.3
-
27
-
-
84964478812
-
-
Yang, P., Zheng, S., 2001. Security management in hierarchical ad hoc network. In: Proceedings of the 2001 International Conferences on Info-tech and Info-net (ICII), Beijing, China, October, pp. 642-649.
-
-
-
|