Author:
Cao Jiannong,Liao Lin,Wang Guojun
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference22 articles.
1. H. Harney, E. Harder, Logical key hierarchy protocol, Internet draft, draft-harney-sparta-lkhp-sec-00.txt, 1999
2. Secure group communications using key graphs;Wong;IEEE/ACM Transactions on Networking,2000
3. D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, Internet draft, draft-balenson-groupkeymgmt-oft-00.txt, 1999
4. R. Di Pietro, L.V. Mancini, S. Jajodia, Efficient and secure key management for wireless mobile communications, in: Proceedings of the Second ACM International Workshop on Principles of Mobile Computing, 2002, pp. 66–73
5. Protocol designs for scalable and reliable group rekeying;Brian;IEEE/ACM Transactions on Networking,2003
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献