Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Introduction to algorithms
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Improving Internet multicast with routing labels
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Secure Group Communications Using Key Graphs
Secure Group Communications Using Key Graphs
Enclaves: enabling secure collaboration over the Internet
IEEE Journal on Selected Areas in Communications
Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
A New Conference Network for Group Communication
IEEE Transactions on Computers
VeriSign CZAG: Privacy Leak in X.509 Certificates
Proceedings of the 11th USENIX Security Symposium
An adaptive tree structure algorithm for efficient key management in group communication
ICCC '02 Proceedings of the 15th international conference on Computer communication
Design, implementation and performance analysis of secure group communications
ICCC '02 Proceedings of the 15th international conference on Computer communication
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
A scalable key-management scheme with minimizing key storage for secure group communications
International Journal of Network Management
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Scalable and lightweight key distribution for secure group communications
International Journal of Network Management
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
Information Processing Letters
A middleware service for secure group communication in mobile ad hoc networks
Journal of Systems and Software - Special issue: Computer software & applications
Key management for high bandwidth secure multicast
Journal of Computer Security
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Addressing the shortcomings of one-way chains
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
A practical revocation scheme for broadcast encryption using smartcards
ACM Transactions on Information and System Security (TISSEC)
Improved efficiency for revocation schemes via Newton interpolation
ACM Transactions on Information and System Security (TISSEC)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Implementing group signature schemes with smart cards
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Key management for long-lived sensor networks in hostile environments
Computer Communications
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Sciences: an International Journal
An innovative revocation scheme for one-to-many E-services
Electronic Commerce Research and Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic key management solution to access hierarchy
International Journal of Network Management
An group key distribution protocol for secure group communications
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Proceedings of the 2nd international conference on Scalable information systems
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
A tree-based scheme for security of many-to-many communications
Journal of High Speed Networks - Broadband Multimedia Sensor Networks in Healthcare Applications
A*-based key tree structure generation for group key management in wireless sensor networks
Computer Communications
Optimizing deletion cost for secure multicast key management
Theoretical Computer Science
A mechanism to enforce privacy in vehicle-to-infrastructure communication
Computer Communications
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Security of the redefined Liaw's broadcasting cryptosystem
Computers & Mathematics with Applications
Offering data confidentiality for multimedia overlay multicast: Design and analysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Optimal Tree Structures for Group Key Tree Management Considering Insertion and Deletion Cost
COCOON '08 Proceedings of the 14th annual international conference on Computing and Combinatorics
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Review: Comparative study of broadcast and multicast in 3GPP and 3GPP2 networks
Computer Communications
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A key management solution for overlay-live-streaming
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
A Secure Message Percolation Scheme for Wireless Sensor Network
Information Networking. Towards Ubiquitous Networking and Services
Key hierarchies for hierarchical access control in secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Supporting flexible streaming media protection through privacy-aware secure processors
Computers and Electrical Engineering
Approximately optimal trees for group key management with batch updates
Theoretical Computer Science
Usable secure mailing lists with untrusted servers
Proceedings of the 8th Symposium on Identity and Trust on the Internet
International Journal of Ad Hoc and Ubiquitous Computing
Optimal tree structures for group key tree management considering insertion and deletion cost
Theoretical Computer Science
A one-round secure message broadcasting protocol through a key sharing tree
Information Processing Letters
Complexity comparison of Lagrange and Newton polynomial based revocation schemes
ECC'08 Proceedings of the 2nd conference on European computing conference
Secure group communication in wireless mesh networks
Ad Hoc Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Secret instantiation in ad-hoc networks
Computer Communications
GeoSENS: geo-based sensor network secure communication protocol
Computer Communications
Explicit routing in multicast overlay networks
Computer Communications
Collision attacks with budget constraints on key management schemes for secure multimedia multicast
IEEE Transactions on Multimedia - Special section on communities and media computing
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
Bandwidth efficient key distribution for secure multicast in dynamic wireless mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Multicast routing protocols in mobile ad hoc networks: a comparative survey and taxonomy
EURASIP Journal on Wireless Communications and Networking
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Information Processing Letters
A tree key graph design scheme for hierarchical multi-group access control
IEEE Communications Letters
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Wireless broadcast encryption based on smart cards
Wireless Networks
Key-update distribution in secure group communication
Computer Communications
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Tackling adaptive corruptions in multicast encryption protocols
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Evaluation and analysis of computational complexity for secure multicast models
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Approximately optimal trees for group key management with batch updates
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Multigroup rekeying for a wireless network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Scalable and efficient approach for secure group communication
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Secure group communication using binomial trees
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient key management scheme for live streaming
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Dynamic rekeying in 3GPP multimedia broadcast/multicast service (MBMS)
IEEE Communications Letters
An Efficient and Secure Self-Healing Scheme for LKH
Journal of Network and Systems Management
Scalable rekeying for dynamic groups using key path compression
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Hierarchies of keys in secure multicast communications
Journal of Computer Security
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Secure unicast and multicast over satellite DVB using chaotic generators
International Journal of Internet Technology and Secured Transactions
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Secure collaborative cloud design for global USN services
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Threshold public-key encryption with adaptive security and short ciphertexts
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Cross-layer jamming detection and mitigation in wireless broadcast networks
IEEE/ACM Transactions on Networking (TON)
Bounded vector signatures and their applications
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
SKQML: a secure multi-agent communication language
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Secure group key distribution protocol for distributed systems
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Key distribution protocol for secure multicast with reduced communication delay
AMT'11 Proceedings of the 7th international conference on Active media technology
Fully distributed broadcast encryption
ProvSec'11 Proceedings of the 5th international conference on Provable security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
EventGuard: A System Architecture for Securing Publish-Subscribe Networks
ACM Transactions on Computer Systems (TOCS)
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
Optimal tree structure with loyal users and batch updates
Journal of Combinatorial Optimization
Personal and Ubiquitous Computing
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Distributed group access control architecture for secure multicast
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Accusation resolution using security metrology
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Poster: attribute based broadcast encryption with permanent revocation
Proceedings of the 18th ACM conference on Computer and communications security
A hierarchical key management approach for secure multicast
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
Corrupting one vs. corrupting many: the case of broadcast and multicast encryption
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
An efficient access control model for highly distributed computing environment
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A new group rekeying method in secure multicast
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Computational bounds on hierarchical data processing with applications to information security
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Efficient group key management for dynamic peer networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Cryptanalysis of two group key management protocols for secure multicast
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Key management for secure overlay multicast
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Group-Based Authentication and Key Agreement
Wireless Personal Communications: An International Journal
GKDA: a group-based key distribution algorithm for WiMAX MBS security
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
A novel key management and distribution solution for secure video multicast
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
A practical clumped-tree multicast encryption scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
An efficient hierarchical group key management protocol for a ubiquitous computing environment
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Adaptive security of symbolic encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Distributing key updates in secure dynamic groups
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
An efficient key tree management algorithm for LKH group key management
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Topology-Aware key management scheme for secure overlay multicast
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Secure multicast using proxy encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A flexible framework for secret handshakes
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Journal of Computational and Applied Mathematics
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
User revocation in secure adhoc networks
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Bridging broadcast encryption and group key agreement
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Key distribution for Pay-TV system with reduced computation cost using XOR operation
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
N-ary tree based key distribution in a network as a service provisioning model
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Enforcing subscription-based authorization policies in cloud scenarios
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
Towards secure and communication-efficient broadcast encryption systems
Journal of Network and Computer Applications
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
Secure content delivery in information-centric networks: design, implementation, and analyses
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Key Management in Secure Satellite Multicast Using Key Hypergraphs
Wireless Personal Communications: An International Journal
Optimal key tree structure for two-user replacement and deletion problems
Journal of Combinatorial Optimization
CloudHKA: a cryptographic approach for hierarchical access control in cloud computing
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hardware security platform for multicast communications
Journal of Systems Architecture: the EUROMICRO Journal
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks
Wireless Personal Communications: An International Journal
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Secure group re-keying using key inverses
Journal of High Speed Networks
Hi-index | 0.02 |