-
2
-
-
84872470828
-
Internet on the move: Challenges and solutions
-
Sathiaseelan, A., & Crowcroft, J. (2012). Internet on the move: Challenges and solutions. ACM SIGCOMM Computer Communication Review, 43(1), 51–55. doi:10.1145/2427036.2427046
-
(2012)
ACM SIGCOMM Computer Communication Review
, vol.43
, Issue.1
, pp. 51-55
-
-
Sathiaseelan, A.1
Crowcroft, J.2
-
3
-
-
84875668050
-
Video multicast over WLANs: Power saving and reliability perspectives
-
Shin, Y., Choi, M., Koo, J., & Choi, S. (2013). Video multicast over WLANs: Power saving and reliability perspectives. Network IEEE, 27(2), 40–46. doi:10.1109/MNET.2013.6485095
-
(2013)
Network IEEE
, vol.27
, Issue.2
, pp. 40-46
-
-
Shin, Y.1
Choi, M.2
Koo, J.3
Choi, S.4
-
4
-
-
79958760133
-
Mobile application market: A developer’s perspective
-
Holzer, A., & Ondrus, J. (2011). Mobile application market: A developer’s perspective. Telematics and Informatics, 28(1), 22–31. doi:10.1016/j.tele.2010.05.006
-
(2011)
Telematics and Informatics
, vol.28
, Issue.1
, pp. 22-31
-
-
Holzer, A.1
Ondrus, J.2
-
5
-
-
64249090328
-
Smart phone for mobile commerce
-
Chang, Y. F., Chen, C. S., & Zhou, H. (2009). Smart phone for mobile commerce. Computer Standards and Interfaces, 31(4), 740–747. doi:10.1016/j.csi.2008.09.016
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 740-747
-
-
Chang, Y.F.1
Chen, C.S.2
Zhou, H.3
-
6
-
-
0025430666
-
Multicast routing in datagram internetworks and extended LANs
-
Deering, S. E., & Cheriton, D. R. (1990). Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems, 8(2), 85–110. doi:10.1145/78952.78953
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.2
, pp. 85-110
-
-
Deering, S.E.1
Cheriton, D.R.2
-
7
-
-
85054322631
-
-
Accessed 15 Aug 2016
-
Cisco Systems (2012). Internet protocol multicast. http://docwiki.cisco.com/wiki/Internet_Protocol_Multicast. Accessed 15 Aug 2016
-
(2012)
Internet Protocol Multicast
-
-
-
8
-
-
36849063206
-
Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
-
Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. Wireless Communications IEEE, 14(5), 8–20. doi:10.1109/mwc.2007.4396938
-
(2007)
Wireless Communications IEEE
, vol.14
, Issue.5
, pp. 8-20
-
-
Sakarindr, P.1
Ansari, N.2
-
9
-
-
0037250819
-
Security issues and solutions in multicast content distribution: a survey
-
Judge, P., & Ammar, M. (2003). Security issues and solutions in multicast content distribution: a survey. Network IEEE, 17(1), 30–36. doi:10.1109/mnet.2003.1174175
-
(2003)
Network IEEE
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
12
-
-
37849053218
-
A survey of application-layer multicast protocols
-
Hosseini, M., Ahmed, D. T., Shirmohammadi, S., & Georganas, N. D. (2007). A survey of application-layer multicast protocols. Communications Surveys and Tutorials IEEE, 9(3), 58–74
-
(2007)
Communications Surveys and Tutorials IEEE
, vol.9
, Issue.3
, pp. 58-74
-
-
Hosseini, M.1
Ahmed, D.T.2
Shirmohammadi, S.3
Georganas, N.D.4
-
13
-
-
34548827597
-
A study of different types of attacks on multicast in mobile ad hoc networks
-
Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32–46
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 32-46
-
-
Nguyen, H.L.1
Nguyen, U.T.2
-
14
-
-
84983503423
-
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
-
Iqbal, S., Mat Kiah, M. L., Daghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120. doi:10.1016/j.jnca.2016.08.016
-
(2016)
Journal of Network and Computer Applications
, vol.74
, pp. 98-120
-
-
Iqbal, S.1
Mat Kiah, M.L.2
Daghighi, B.3
Hussain, M.4
Khan, S.5
Khan, M.K.6
-
15
-
-
34247249787
-
Multicast Security (MSEC) Group Key Management Architecture. RFC 4046
-
Baugher, M., Canetti, R., Dondeti, L., & Lindholm, F. (2005). Multicast Security (MSEC) Group Key Management Architecture. RFC 4046. Internet Engineering Task Force
-
(2005)
Internet Engineering Task Force
-
-
Baugher, M.1
Canetti, R.2
Dondeti, L.3
Lindholm, F.4
-
16
-
-
3242657408
-
Group key agreement efficient in communication
-
Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905–921
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.7
, pp. 905-921
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
3142512728
-
Tree-based group key agreement
-
Kim, Y., Perrig, A., & Tsudik, G. (2004). Tree-based group key agreement. ACM Transactions on Information and System Security, 7(1), 60–96
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
18
-
-
0345565893
-
A survey of key management for secure group communication
-
Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
19
-
-
78650326704
-
Survey of security services on group communications
-
Sakarindr, P., & Ansari, N. (2010). Survey of security services on group communications. Information Security IET, 4(4), 258–272. doi:10.1049/iet-ifs.2009.0261
-
(2010)
Information Security IET
, vol.4
, Issue.4
, pp. 258-272
-
-
Sakarindr, P.1
Ansari, N.2
-
20
-
-
84921033454
-
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
-
Daghighi, B., Mat Kiah, M. L., Shamshirband, S., & Rehman, M. H. U. (2015). Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. Journal of Network and Computer Applications, 50, 1–14. doi:10.1016/j.jnca.2014.11.001
-
(2015)
Journal of Network and Computer Applications
, vol.50
, pp. 1-14
-
-
Daghighi, B.1
Mat Kiah, M.L.2
Shamshirband, S.3
Rehman, M.H.U.4
-
21
-
-
33748118047
-
Group key management protocols: A novel taxonomy
-
Challal, Y., & Seba, H. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(1), 105–118
-
(2005)
International Journal of Information Technology
, vol.2
, Issue.1
, pp. 105-118
-
-
Challal, Y.1
Seba, H.2
-
22
-
-
0033893174
-
Secure group communications using key graphs
-
Chung Kei, W., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. Networking IEEE/ACM Transactions on, 8(1), 16–30. doi:10.1109/90.836475
-
(2000)
Networking IEEE/ACM Transactions on
, vol.8
, Issue.1
, pp. 16-30
-
-
Chung Kei, W.1
Gouda, M.2
Lam, S.S.3
-
23
-
-
80054073044
-
Scalable delay-constrained multicast group key management
-
Gharout, S., Challal, Y., & Bouabdallah, A. (2008). Scalable delay-constrained multicast group key management. International Journal of Network Security, 7(2), 142–156
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 142-156
-
-
Gharout, S.1
Challal, Y.2
Bouabdallah, A.3
-
24
-
-
52249114327
-
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
-
IEEE Computer Society
-
Mat Kiah, M. L., & Martin, K. M. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In Proceedings of the future generation communication and networking 2007 (Vol. 01, pp. 100–107): IEEE Computer Society. doi:10.1109/FGCN.2007.144
-
Proceedings of the Future Generation Communication and Networking 2007
, vol.1
, pp. 100-107
-
-
Mat Kiah, M.L.1
Martin, K.M.2
-
25
-
-
15744371024
-
SAKM: A scalable and adaptive key management approach for multicast communications
-
Challal, Y., Bettahar, H., & Bouabdallah, A. (2004). SAKM: A scalable and adaptive key management approach for multicast communications. ACM SIGCOMM Computer Communication Review, 34(2), 55–70. doi:10.1145/997150.997157
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 55-70
-
-
Challal, Y.1
Bettahar, H.2
Bouabdallah, A.3
-
26
-
-
2942564655
-
A scalable and distributed multicast security protocol using a subgroup-key hierarchy
-
Heba, K. A. (2004). A scalable and distributed multicast security protocol using a subgroup-key hierarchy. Computers and Security, 23(4), 320–329. doi:10.1016/j.cose.2003.11.003
-
(2004)
Computers and Security
, vol.23
, Issue.4
, pp. 320-329
-
-
Heba, K.A.1
-
28
-
-
26444509370
-
IP mobile multicast: Challenges and solutions
-
Romdhani, I., Kellil, M., Hong-Yon, L., Bouabdallah, A., & Bettahar, H. (2004). IP mobile multicast: Challenges and solutions. Communications Surveys and Tutorials IEEE, 6(1), 18–41. doi:10.1109/comst.2004.5342232
-
(2004)
Communications Surveys and Tutorials IEEE
, vol.6
, Issue.1
, pp. 18-41
-
-
Romdhani, I.1
Kellil, M.2
Hong-Yon, L.3
Bouabdallah, A.4
Bettahar, H.5
-
29
-
-
82155172863
-
Mobility management for IP-based next generation mobile networks: Review, challenge and perspective
-
Al-Surmi, I., Othman, M., & Mohd Ali, B. (2012). Mobility management for IP-based next generation mobile networks: Review, challenge and perspective. Journal of Network and Computer Applications, 35(1), 295–315. doi:10.1016/j.jnca.2011.09.001
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.1
, pp. 295-315
-
-
Al-Surmi, I.1
Othman, M.2
Mohd Ali, B.3
-
30
-
-
84936971520
-
Key management paradigm for mobile secure group communications: Issues, solutions, and challenges
-
Daghighi, B., Mat Kiah, M. L., Shamshirband, S., Iqbal, S., & Asghari, P. (2015). Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Computer Communications, 72, 1–16. doi:10.1016/j.comcom.2015.05.008
-
(2015)
Computer Communications
, vol.72
, pp. 1-16
-
-
Daghighi, B.1
Mat Kiah, M.L.2
Shamshirband, S.3
Iqbal, S.4
Asghari, P.5
-
31
-
-
84862700296
-
Adaptive group key management protocol for wireless communications
-
Gharout, S., Bouabdallah, A., Challal, Y., & Achemlal, M. (2012). Adaptive group key management protocol for wireless communications. Journal of Universal Computer Science, 18(6), 874–898
-
(2012)
Journal of Universal Computer Science
, vol.18
, Issue.6
, pp. 874-898
-
-
Gharout, S.1
Bouabdallah, A.2
Challal, Y.3
Achemlal, M.4
-
33
-
-
37549056155
-
Hierarchical group access control for secure multicast communications
-
Yan, S., & Liu, K. J. R. (2007). Hierarchical group access control for secure multicast communications. Networking IEEE/ACM Transactions on, 15(6), 1514–1526
-
(2007)
Networking IEEE/ACM Transactions on
, vol.15
, Issue.6
, pp. 1514-1526
-
-
Yan, S.1
Liu, K.J.R.2
-
34
-
-
34147147912
-
Dynamic balanced key tree management for secure Multicast communications
-
Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007). Dynamic balanced key tree management for secure Multicast communications. Computers IEEE Transactions on, 56(5), 590–605
-
(2007)
Computers IEEE Transactions on
, vol.56
, Issue.5
, pp. 590-605
-
-
Ng, W.H.D.1
Howarth, M.2
Sun, Z.3
Cruickshank, H.4
-
35
-
-
54349088694
-
Secure and efficient group key management with shared key derivation
-
Lin, J. C., Huang, K. H., Lai, F., & Lee, H. C. (2009). Secure and efficient group key management with shared key derivation. Computer Standards and Interfaces, 31(1), 192–208
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.1
, pp. 192-208
-
-
Lin, J.C.1
Huang, K.H.2
Lai, F.3
Lee, H.C.4
-
36
-
-
72549116358
-
Computation-and-storage-efficient key tree management protocol for secure multicast communications
-
Je, D.-H., Lee, J.-S., Park, Y., & Seo, S.-W. (2010). Computation-and-storage-efficient key tree management protocol for secure multicast communications. Computer Communications, 33(2), 136–148. doi:10.1016/j.comcom.2009.08.007
-
(2010)
Computer Communications
, vol.33
, Issue.2
, pp. 136-148
-
-
Je, D.-H.1
Lee, J.-S.2
Park, Y.3
Seo, S.-W.4
-
37
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New Delhi, India
-
Steiner, M., Tsudik, G., & Waidner, M. Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM conference on Computer and communications security, New Delhi, India, 1996 (pp. 31–37): ACM. doi:10.1145/238168.238182
-
(1996)
Proceedings of the 3Rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
38
-
-
27644534176
-
Secure spread: An integrated architecture for secure group communication
-
Amir, Y., Nita-Rotaru, C., Stanton, S., & Tsudik, G. (2005). Secure spread: An integrated architecture for secure group communication. Dependable and Secure Computing IEEE Transactions on, 2(3), 248–261
-
(2005)
Dependable and Secure Computing IEEE Transactions on
, vol.2
, Issue.3
, pp. 248-261
-
-
Amir, Y.1
Nita-Rotaru, C.2
Stanton, S.3
Tsudik, G.4
-
39
-
-
33749609746
-
A communication-computation efficient group key algorithm for large and dynamic groups
-
Zheng, S., Manz, D., & Alves-Foss, J. (2007). A communication-computation efficient group key algorithm for large and dynamic groups. Computer Networks, 51(1), 69–93. doi:10.1016/j.comnet.2006.03.008
-
(2007)
Computer Networks
, vol.51
, Issue.1
, pp. 69-93
-
-
Zheng, S.1
Manz, D.2
Alves-Foss, J.3
-
40
-
-
51849155543
-
Notes on the CRTDH Group Key Agreement Protocol
-
Paper presented at the Distributed Computing Systems Workshops, 2008. ICDCS ‘08
-
Magliveras, S., Wandi, W., & Xukai, Z. (2008). Notes on the CRTDH Group Key Agreement Protocol. Paper presented at the Distributed Computing Systems Workshops, 2008. ICDCS ‘08. 28th International Conference on
-
(2008)
28Th International Conference On
-
-
Magliveras, S.1
Wandi, W.2
Xukai, Z.3
-
41
-
-
77958458851
-
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
-
Konstantinou, E. (2011). Efficient cluster-based group key agreement protocols for wireless ad hoc networks. Journal of Network and Computer Applications, 34(1), 384–393
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 384-393
-
-
Konstantinou, E.1
-
42
-
-
84865071791
-
Group key agreement for secure group communication in dynamic peer systems
-
Lv, X., Li, H., & Wang, B. (2012). Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing, 72(10), 1195–1200. doi:10.1016/j.jpdc.2012.06.004
-
(2012)
Journal of Parallel and Distributed Computing
, vol.72
, Issue.10
, pp. 1195-1200
-
-
Lv, X.1
Li, H.2
Wang, B.3
-
44
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Mittra, S. (1997). Iolus: A framework for scalable secure multicasting. SIGCOMM Computer Communication Review, 27(4), 277–288
-
(1997)
SIGCOMM Computer Communication Review
, vol.27
, Issue.4
, pp. 277-288
-
-
Mittra, S.1
-
45
-
-
34848843875
-
A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
-
Nemaney Pour, A., Kumekawa, K., Kato, T., & Itoh, S. (2007). A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Computer Networks, 51(17), 4727–4743. doi:10.1016/j.comnet.2007.07.007
-
(2007)
Computer Networks
, vol.51
, Issue.17
, pp. 4727-4743
-
-
Nemaney Pour, A.1
Kumekawa, K.2
Kato, T.3
Itoh, S.4
-
46
-
-
40849124634
-
Performance optimization of region-based group key management in mobile ad hoc networks
-
Cho, J.-H., Chen, I.-R., & Wang, D.-C. (2008). Performance optimization of region-based group key management in mobile ad hoc networks. Performance Evaluation, 65(5), 319–344. doi:10.1016/j.peva.2007.07.002
-
(2008)
Performance Evaluation
, vol.65
, Issue.5
, pp. 319-344
-
-
Cho, J.-H.1
Chen, I.-R.2
Wang, D.-C.3
-
47
-
-
46849100481
-
A scalable key management and clustering scheme for wireless ad hoc and sensor networks
-
Li, J. H., Bhattacharjee, B., Yu, M., & Levy, R. (2008). A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems, 24(8), 860–869. doi:10.1016/j.future.2008.03.007
-
(2008)
Future Generation Computer Systems
, vol.24
, Issue.8
, pp. 860-869
-
-
Li, J.H.1
Bhattacharjee, B.2
Yu, M.3
Levy, R.4
-
48
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Challal, Y., Gharout, S., Bouabdallah, A., & Bettahar, H. (2008). Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks, 3(2), 133–146
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
49
-
-
77956577652
-
A decentralized multi-group key management scheme
-
Hur, J., & Yoon, H. (2009). A decentralized multi-group key management scheme. IEICE Transactions on Communications, 92, 632–635
-
(2009)
IEICE Transactions on Communications
, vol.92
, pp. 632-635
-
-
Hur, J.1
Yoon, H.2
-
50
-
-
84899501069
-
Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks
-
Mehdizadeh, A., Hashim, F., & Othman, M. (2014). Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks. Journal of Network and Computer Applications, 42, 59–69. doi:10.1016/j.jnca.2014.03.013
-
(2014)
Journal of Network and Computer Applications
, vol.42
, pp. 59-69
-
-
Mehdizadeh, A.1
Hashim, F.2
Othman, M.3
-
51
-
-
33847181724
-
Random waypoint mobility model in cellular networks
-
Hyytiä, E., & Virtamo, J. (2007). Random waypoint mobility model in cellular networks. Wireless Networks, 13(2), 177–188. doi:10.1007/s11276-006-4600-3
-
(2007)
Wireless Networks
, vol.13
, Issue.2
, pp. 177-188
-
-
Hyytiä, E.1
Virtamo, J.2
-
52
-
-
84937520339
-
Community aware heterogeneous human mobility (CAHM): Model and analysis
-
Narmawala, Z., & Srivastava, S. (2015). Community aware heterogeneous human mobility (CAHM): Model and analysis. Pervasive and Mobile Computing, 21, 119–132. doi:10.1016/j.pmcj.2014.12.008
-
(2015)
Pervasive and Mobile Computing
, vol.21
, pp. 119-132
-
-
Narmawala, Z.1
Srivastava, S.2
-
53
-
-
85007387458
-
The value strength aided information diffusion in socially-aware mobile networks
-
Wang, J., Jiang, C., Quek, T. Q. S., Wang, X., & Ren, Y. (2016). The value strength aided information diffusion in socially-aware mobile networks. IEEE Access, 4, 3907–3919. doi:10.1109/ACCESS.2016.2600526
-
(2016)
IEEE Access
, vol.4
, pp. 3907-3919
-
-
Wang, J.1
Jiang, C.2
Quek, T.Q.S.3
Wang, X.4
Ren, Y.5
-
54
-
-
84922900595
-
Mining personal data using smartphones and wearable devices: A survey
-
Habib ur Rahman, M., Liew, C. S., Wah, T. Y., Shuja, J., & Daghighi, B. (2015). Mining personal data using smartphones and wearable devices: A survey. Sensors, 15(2), 4430–4469
-
(2015)
Sensors
, vol.15
, Issue.2
, pp. 4430-4469
-
-
Habib ur Rahman, M.1
Liew, C.S.2
Wah, T.Y.3
Shuja, J.4
Daghighi, B.5
-
55
-
-
32644441025
-
Scalable key management for secure multicast communication in the mobile environment
-
Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187–203
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
, pp. 187-203
-
-
Cao, J.1
Liao, L.2
Wang, G.3
-
56
-
-
0141538021
-
Efficient and secure keys management for wireless mobile communications
-
Toulouse, France
-
Pietro, R. D., Mancini, L. V., & Jajodia, S. (2002). Efficient and secure keys management for wireless mobile communications. Paper presented at the Proceedings of the second ACM international workshop on Principles of mobile computing, Toulouse, France
-
(2002)
Paper Presented at the Proceedings of the Second ACM International Workshop on Principles of Mobile Computing
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
57
-
-
33750958124
-
Key management scheme for providing the confidentiality in mobile multicast
-
20-22 Feb. 2006 2006
-
Jong-Hyuk, R., & Kyoon-Ha, L. (2006). Key management scheme for providing the confidentiality in mobile multicast. In Advanced communication technology, 2006. ICACT 2006. The 8th international conference, 20-22 Feb. 2006 2006 (Vol. 2, pp. 1205–1209). doi:10.1109/icact.2006.206187
-
(2006)
Advanced Communication Technology, 2006. ICACT 2006. the 8Th International Conference
, vol.2
, pp. 1205-1209
-
-
Jong-Hyuk, R.1
Kyoon-Ha, L.2
-
58
-
-
0038391332
-
-
Kamat, S., Parimi, S., & Agrawal, D. P. Reduction in control overhead for a secure, scalable framework for mobile multicast. In, 2003 (Vol. 1, pp. 98–103 vol. 101): IEEE
-
-
-
Kamat, S.1
Parimi, S.2
Agrawal, D.P.3
-
59
-
-
0035728669
-
Secure group communications for wireless networks
-
DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., et al. (2001). Secure group communications for wireless networks. Paper presented at the Military Communications Conference, (MILCOM 2001)
-
(2001)
Paper Presented at the Military Communications Conference
-
-
Decleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
-
60
-
-
77958032694
-
Key management with host mobility in dynamic groups
-
Taganrog, Rostov-on-Don, Russian Federation
-
Gharout, S., Bouabdallah, A., Kellil, M., & Challal, Y. (2010). Key management with host mobility in dynamic groups. Paper presented at the Proceedings of the 3rd international conference on Security of information and networks, Taganrog, Rostov-on-Don, Russian Federation
-
(2010)
Paper Presented at the Proceedings of the 3Rd International Conference on Security of Information and Networks
-
-
Gharout, S.1
Bouabdallah, A.2
Kellil, M.3
Challal, Y.4
-
61
-
-
84942539917
-
An implementation of secure group communication in a wireless environment
-
Kiah, M. L. M., & Daghighi, B. (2012). An implementation of secure group communication in a wireless environment. International Journal of Computer and Electrical Engineering, 4(6), 850
-
(2012)
International Journal of Computer and Electrical Engineering
, vol.4
, Issue.6
, pp. 850
-
-
Kiah, M.L.M.1
Daghighi, B.2
-
62
-
-
0031383381
-
A reliable multicast framework for light-weight sessions and application level framing
-
Floyd, S., Jacobson, V., Liu, C.-G., McCanne, S., & Zhang, L. (1997). A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM Transactions on Networking, 5(6), 784–803. doi:10.1109/90.650139
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 784-803
-
-
Floyd, S.1
Jacobson, V.2
Liu, C.-G.3
McCanne, S.4
Zhang, L.5
-
63
-
-
74349084986
-
An efficient reliable multicast protocol for 802.11-based wireless LANs
-
Srinivas, V., & Lu, R. An efficient reliable multicast protocol for 802.11-based wireless LANs. In world of wireless, mobile and multimedia networks & workshops, 2009. WoWMoM 2009. IEEE international symposium on a, 15-19 June 2009 2009 (pp. 1–6). doi:10.1109/WOWMOM.2009.5282455
-
World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. Wowmom 2009. IEEE International Symposium on A, 15-19 June 2009 2009
, pp. 1-6
-
-
Srinivas, V.1
Lu, R.2
-
65
-
-
0029749268
-
Collecting and modeling the join/leave behavior of multicast group members in the mbone
-
IEEE
-
Almeroth, K. C., & Ammar, M. H. Collecting and modeling the join/leave behavior of multicast group members in the mbone. In high performance distributed computing, 1996., proceedings of 5th IEEE international symposium on, 1996 (pp. 209–216): IEEE
-
(1996)
In High Performance Distributed Computing, 1996., Proceedings of 5Th IEEE International Symposium On
, pp. 209-216
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
66
-
-
0242341057
-
Multicast group behavior in the Internet’s multicast backbone (MBone)
-
Almeroth, K. C., & Ammar, M. H. (1997). Multicast group behavior in the Internet’s multicast backbone (MBone). Communications Magazine IEEE, 35(6), 124–129
-
(1997)
Communications Magazine IEEE
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
68
-
-
84889396610
-
-
Wiley, Hoboken
-
Bolch, G., Greiner, S., de Meer, H., & Trivedi, K. S. (2006). Queueing networks and Markov chains: modeling and performance evaluation with computer science applications. Hoboken: Wiley
-
(2006)
Queueing networks and Markov chains: modeling and performance evaluation with computer science applications
-
-
Bolch, G.1
Greiner, S.2
de Meer, H.3
Trivedi, K.S.4
|