共 20 条
[1]
Begum S. Jabeen, 2011, Journal of Computer Sciences, V7, P328, DOI 10.3844/jcssp.2011.328.340
[2]
Dhamija Rachna, 2000, P 9 USENIX SEC S
[3]
Herzberg A, 1995, LECT NOTES COMPUT SC, V963, P339
[4]
Ilango S, 2004, P INT C INF TECHN CO, DOI [10.1109/ITCC.2004.1286664, DOI 10.1109/ITCC.2004.1286664]
[5]
Jancy Rani D, 2016, INT J INNOV RES COMP, V4, P556, DOI [10.15680/IJIRCCE.2016.0401126, DOI 10.15680/IJIRCCE.2016.0401126]
[6]
Keerthana R, 2014, INT J INNOV RES COMP, V2, P1177
[7]
Khandelwal A, 2010, INT J COMPUT APPL, V1, P100
[9]
Moraskar Vaibhav, 2014, INT J COMPUTER SCI M, V3, P166
[10]
Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory
[J].
2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2,
2008,
:124-129