Efficient wimax network group key management scheme

被引:0
作者
Hu, Ge [1 ]
Peng, Shuai [1 ]
Li, Yang [2 ]
Yang, Yatao [2 ]
机构
[1] College of Chemistry and Chemical Engineering, Chongqing University, Chongqing 400044, China
[2] Information Security Center, State Key Laboratory of Networking and Switching, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
Journal of Computational Information Systems | 2009年 / 5卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Network security
引用
收藏
页码:1359 / 1365
相关论文
共 50 条
  • [31] Using ontologies and XML scheme in distributed knowledge management system
    Chen, Qingzhang
    Jia, Jixuan
    Fang, Dina
    Chen, Rong
    Journal of Information and Computational Science, 2009, 6 (03): : 1365 - 1373
  • [32] FPGA implementation of dynamic key management for des encryption algorithm
    Yao, Ji
    Kang, Hongbo
    Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology, EMEIT 2011, 2011, 9 : 4795 - 4798
  • [33] Turn-key dewatering management: Design, feasibility and operations
    Geo-Synthetics, LLC, 2401 Pewaukee Rd, Waukesha, WI 53188, United States
    不详
    Geotech Spec Publ, 211 GSP (2101-2110):
  • [34] THE GENERAL REQUIREMENTS FOR EFFICIENT PROJECT-MANAGEMENT
    KOCH, JD
    JOURNAL OF THE SOUTH AFRICAN INSTITUTE OF MINING AND METALLURGY, 1981, 81 (07): : 205 - 211
  • [35] A new fractional call admission control scheme in integrated cellular network
    Department of Computer Engineering, Sharif University of Technology-International Campus, Kish Island, Iran
    不详
    Proc. IEEE Int. Conf. Electro/Inf. Technol., eit, (332-337):
  • [36] Priority based congestion avoidance hybrid scheme for Wireless Sensor Network
    Department of Computer Science and Engineering, Chandigarh University, Mohali, Punjab
    147001, India
    Proc. Int. Conf. Next Gener. Comput. Technol., NGCT, (158-165):
  • [37] Methods of Determination of the Main Framework Scheme for a Power Transmission Network.
    De Batz, Simone
    Merlin, Andre
    Santucci, Gerard
    RGE, Revue Generale de l'Electricite, 1981, (06): : 479 - 485
  • [38] Performance of a Jini-based Ad Hoc Network Authentication Scheme
    McMahon, M.M.
    Needham, D.M.
    Datko, J.B.
    ISCA Int. Conf. Parallel Distrib. Comput. Syst., PDCS, 1600, (442-447):
  • [39] LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems
    Sun L.
    Xu X.
    Security and Communication Networks, 2023, 2023
  • [40] RWA scheme minimizing FWM effect in a wide area optical network
    Department of Electronics Technology, Guru Nanak Dev University, Amritsar, India
    不详
    Optik, 17 (1588-1593):