Author:
Lin Hua-Yi,Chiang Tzu-Chiang
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference23 articles.
1. Das SM, Pucha H, Hu YC: Distributed hashing for scalable multicast in wireless ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 2008, 19(3):347-362.
2. Rong B, Chen HH, Qian YI, Lu K, Hu RQ, Guizani S: A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: the key management study. IEEE Transactions on Vehicular Technology 2009, 58(1):398-408.
3. He W, Huang Y, Sathyam R, Nahrstedt K, Lee WC: SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Transactions on Information Forensics and Security 2009, 4(1):140-150.
4. Basagni S, Chlamtac I, Syrotiuk VR, Talebi R: On-demand location aware multicast (OLAM) for ad hoc networks. Proceedings of IEEE Wireless Communications and Networking Conference, September 2000 1323-1328.
5. Wang NC, Fang SZ: A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software 2007, 80(10):1667-1677. 10.1016/j.jss.2006.12.564
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献