References
- I. F. Akyildiz, X. Wang, W. Wang, Wireless Mesh Networks: A Survey, Computer Networks 47 (March 2005), pp.445-487. https://doi.org/10.1016/j.comnet.2004.12.001
- IEEE Std 802.16-2004, Air Interface for Broadband Wireless Access Systems, October 2004.
- Y. Zhang, Y. Fang, A Secure Authentication and Billing Architecture for Wireless Mesh Networks, Wireless Networks 13 (2007), pp.663-678. https://doi.org/10.1007/s11276-006-8148-z
- S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys 35 (September 2003), pp.309-329. https://doi.org/10.1145/937503.937506
- A. Ivan, Y. Dodis, Proxy Cryptography Revisited, in: Proceedings Network and Distributed System Security Symposium (February 2003).
- WiMAX Forum, "Mobile WiMAX-Part I: A Technical Overview and Performance Evaluation," February 2006.
- D. Huang, D. Medhi, A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication, ACM Transactions on Information and System Security 7 (November 2004), pp.1-30. https://doi.org/10.1145/984334.984335
- C. K. Wong, M. G. Gouda, and S. S. Lam, Secure Group Communications Using Key Graphs, in: Proceedings ACM SIGCOMM (September 1998), pp.68-79.
- D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using Oneway Function Trees, Tech. Rep. No. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md.
- S. Mittra, Iolus: A Framework for Scalable Secure Multicasting, in: Proceeding ACM SIGCOMM (September 1997), pp.277-288.
- A. N. Pour, K. Kumekawa, T. Kato, S. Itoh, A Hierarchical Group Key Management Scheme for Secure Multicast increasing Efficiency of Key Distribution in Leave Operation, Computer Networks 51 (August 2007), pp.4727-4743. https://doi.org/10.1016/j.comnet.2007.07.007
- M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, in: Proceedings ACM CCS (March 1996), pp.31-37.
- Y. Chiu, C. Lei, C. Huang, Secure Multicast Using Proxy Encryption, in: Proceedings International Conference on Information and Communications Security, Lecture Notes in Computer Science 3783 (December 2005), pp.280-290.
- C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, C.-L. Lei, Secure Multicast in Dynamic Environments, Computer Networks 51 (July 2007), pp.2805-2817. https://doi.org/10.1016/j.comnet.2006.11.027
- L. Dondeti, S. Mukherjee, A. Samal, Scalable Secure One-to-many Group Communication Using Dual Encryption, Computer Communication 23 (July 1999) pp.1681-1701.
- D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, in: Proceedings Crypto 2001, Lecture Notes in Computer Science 2139 (August 2001), pp.213-229.
- S. D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate Pairing, in: Proceedings 5th International Symposium on Algorithmic Number Theory, Lecture Notes in Computer Science 2369 (2002), pp.324-337.
- V. S. Miller, The Weil Pairing and Its Efficient Calculation, J. Cryptol. 17 (2004), pp.235-261.
- Y. J. Choie, E. Lee, Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2, in: Proceedings ICISC 2003, Lecture Notes in Computer Science 2971 (2004), pp.97-111.
- J. Hwu, R. Chen, Y. Lin, An Efficient Identitybased Cryptosystem for End-to-end Mobile Security, IEEE Trans. on Wireless Communications 5 (September 2006), pp.2586-2593. https://doi.org/10.1109/TWC.2006.1687783
- E. Fujisaki, T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, in: Proceedings Crypto 1999, pp.537-554.
- G. M. Bertoni, L. Chen, P. Fragneto, K. A. Harrison, G. Pelosi, Computing Tate Pairing on Smartcards (2005). http://www.st.com/stonline/products/families/smartcard/ches2005\_v4.pdf.
- M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Proceedings Crypto'98 (1998) pp.26-45.
- Y. Tsiounis, M. Yung, On the Security of ElGamal Based Encryption, in: Proceedings International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 1431 (February 1998), pp.117-134.
- D. R. Stinson. Cryptography Theory and Practice (3rd ed.) (Chapman & Hall/CRC, 2006).