-
3
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
J. V. D. Merwe, D. Dawoud and S. McDonald, "A survey on peer-to-peer key management for mobile ad hoc networks" in ACM computing surveys (CSUR), vol. 39, No. 1, 2007
-
(2007)
ACM Computing Surveys (CSUR)
, vol.39
, Issue.1
-
-
Merwe, J.V.D.1
Dawoud, D.2
McDonald, S.3
-
5
-
-
84888998716
-
A review on key management schemes in manet
-
R. Dalai, Y. Singh and M. Khari, "A Review on Key Management Schemes in MANET" in International Journal of Distributed and Parallel Systems, Vol. 3, No. 4, 2012
-
(2012)
International Journal of Distributed and Parallel Systems
, vol.3
, Issue.4
-
-
Dalai, R.1
Singh, Y.2
Khari, M.3
-
6
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
C. Haowen and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks" in Proc. INFOCOM, 2005
-
(2005)
Proc. INFOCOM
-
-
Haowen, C.1
Perrig, A.2
-
7
-
-
4143131440
-
Distributed symmetric key management for mobile ad hoc networks
-
A.C.-F. Chan, "Distributed symmetric key management for mobile ad hoc networks," in Proc. INFOCOM, 2004
-
(2004)
Proc. INFOCOM
-
-
Chan, A.C.-F.1
-
10
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
L. Haiyun, K. Jiejun, P. Zerfos, L. Songwu and Z. Lixia, "URSA: ubiquitous and robust access control for mobile ad hoc networks," in IEEE Transactions on Networking, vol.12, no.6, 2004
-
(2004)
IEEE Transactions on Networking
, vol.12
, Issue.6
-
-
Haiyun, L.1
Jiejun, K.2
Zerfos, P.3
Songwu, L.4
Lixia, Z.5
-
11
-
-
33947656426
-
Secure and efficient key management in mobile ad hoc networks
-
B. Wu, J. Wu, E. B. Fernandez, M. Ilyas and S. Magliveras, "Secure and efficient key management in mobile ad hoc networks" in Journal of Network and Computer Applications, Vol. 30, No. 3, 2007
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.3
-
-
Wu, B.1
Wu, J.2
Fernandez, E.B.3
Ilyas, M.4
Magliveras, S.5
-
12
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," in IEEE Network, Vol. 13, No. 6, 1999
-
(1999)
IEEE Network
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
13
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
S. Capkun, L. Buttyan and J.P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," in IEEE Transaction on Mobile Computing, Vol. 2, No. 1, 2003
-
(2003)
IEEE Transaction on Mobile Computing
, vol.2
, Issue.1
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
15
-
-
79953312656
-
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication
-
April
-
K. Han, C.Y. Yeun, T. Shon, J. Park and K. Kim, "A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication", International Journal of Communication Systems, Wiley, Vol. 24, No. 4, pp. 461-472, April 2011
-
(2011)
International Journal of Communication Systems, Wiley
, vol.24
, Issue.4
, pp. 461-472
-
-
Han, K.1
Yeun, C.Y.2
Shon, T.3
Park, J.4
Kim, K.5
-
16
-
-
79958250702
-
Secure and highly efficient three level key management scheme for MANET
-
W. A. Xiong and Y. H. Gong, "Secure and highly efficient three level key management scheme for MANET" in WSEAS Transactions on Computers, Vol. 10, No. 1, 2011
-
(2011)
WSEAS Transactions on Computers
, vol.10
, Issue.1
-
-
Xiong, W.A.1
Gong, Y.H.2
-
21
-
-
56049096287
-
Secure authenticated group key agreement protocol in the manet environment
-
August
-
C.Y. Yeun, K. Han, D.L. Vo and K.J. Kim, "Secure authenticated Group Key Agreement Protocol in the MANET Environment", Information Security Technical Report, Elsevier, Vol. 13, No. 3, pp. 158-164, August 2008
-
(2008)
Information Security Technical Report, Elsevier
, vol.13
, Issue.3
, pp. 158-164
-
-
Yeun, C.Y.1
Han, K.2
Vo, D.L.3
Kim, K.J.4
-
22
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
B. Wu, J Wu and Y. Dong, "An efficient group key management scheme for mobile ad hoc networks" in International Journal of Security and Networks, Vol. 4, No. 1, 2009
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
|