共 33 条
- [21] Key management based on hierarchical secret sharing in ad-hoc networks INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 182 - 191
- [22] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
- [23] TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U491 - U496
- [24] Strategy and Simulation of Trust Cluster Based Key Management Protocol for Ad hoc Networks ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 269 - 274
- [25] Mixed key management using Hamming Distance for mobile ad-hoc networks COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 665 - +
- [26] A hybrid routing algorithm based on local optimal clusters for ad-hoc networks PROCEEDINGS OF THE 7TH JOINT CONFERENCE ON INFORMATION SCIENCES, 2003, : 1345 - 1348
- [27] Performance analysis of random database group scheme for mobility management in ad hoc networks 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 313 - 317
- [28] A dynamic reconfiguration tolerant self-stabilizing token circulation algorithm in ad-hoc networks PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 256 - 266
- [29] A dynamic node degree management scheme for energy-efficient routing protocols in wireless ad hoc networks 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 7 - 11