Author:
Singh Ajeet,Tiwari Vikas,Tentu Appala Naidu
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference35 articles.
1. Gharout S, Bouabdallah A, Challal Y, Achemlal M (2012) Adaptive group key management protocol for wireless communications. J Univ Comp Sci 18(6):874–898
2. Kiah MLM, Martin KM (2007) “Host mobility protocol for secure group communication in wireless mobile environments”, Proceedings of the Future Generation Communication and Networking, pp.100-107, IEEE Computer Society
3. Wang Q (2011) “Practicality analysis of the self-healing group key distribution schemes for resource-constricted wireless sensor networks”, Third International Conference on Communications and Mobile Computing (CMC), pp.37-40, IEEE
4. Zhao K, Ge L (2013)“A survey on the internet of things security”, 9th International Conference on Computational Intelligence and Security (CIS), pp. 663-667, IEEE
5. Borgohain T, Kumar U, Sanyal S (2015)“Survey of security and privacy issues of internet of thing”, arXiv preprint arXiv:1501.02211
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献