1 |
B.DeCleene, L.Dondeti, S.Griffin, T. Hardjono, D.Kiwior, J.Kurose, D.Towsley, S.Vasudevan, and C.Zhang, 'Secure group communications for wireless networks,' Military Communications Conference. vol. 1. pp. 113-117, Oct. 2001
|
2 |
R. D. Pietro, L. V. Mancini, and S. Jajodia, 'Efficient and secure keys management for wireless mobile communications,' Proceedings of the second ACM international workshop on Principles of mobile computing, Oct. 2002
|
3 |
K. Chan and S.-H. G. Chan, 'Key Management Approaches to Offer Data Confidentiality for Secure Multicast,' IEEE Network, vol. 17, Sep.-Oct. 2003
|
4 |
R. Shankaran, V. Varadharajan, and M. Hitchens, 'A secure multicast support framework for Mobile IP,' IEEE Wireless Communications and Networking, vol. 3, pp. 2114-2119, Mar. 2003
|
5 |
R. Prakash, A. Schiper, and M. Mohsin, 'Reliable multicast in mo¬aile networks.' Wireless Communications and Networking, vol. 3, pp. 1807-1812, Mar. 2003
|
6 |
C. K. Wong, M. Gouda, and S. S. Lam, 'Secure Group Communications Using Key Graphs,' IEEE/ACM Transactions on Networking, vol. 8, pp. 16-29, Feb. 2000
DOI
ScienceOn
|
7 |
Y. Sun, W. Trappe, and K.J.R. Liu, 'A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,' IEEE/ACM Transaction on Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004
DOI
ScienceOn
|
8 |
D. Bruschi and E. Rosti, 'Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues,' Mobile Networks and Applications, vol. 7, no. 6, Dec. 2002
|
9 |
I. Romdhani, M. Kellil, and H.-Y. Lach, 'IP Mobile Multicast: Challenges and Solutions,' IEEE Communications Society Surveys and Tutorials First Quarter 2004
|
10 |
S. Mittra, 'Iolus: A framework for Scalable Secure Multicasting,' Proceedings of ACM SIGCOMM'97. pp. 277-288, 1997
|