1 |
S. Rafaeli, D. Hutchison, A Survey of Key Management for Secure Group Communication, ACM Computing Surveys 35 (September 2003), pp.309-329.
DOI
ScienceOn
|
2 |
WiMAX Forum, "Mobile WiMAX-Part I: A Technical Overview and Performance Evaluation," February 2006.
|
3 |
D. Huang, D. Medhi, A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication, ACM Transactions on Information and System Security 7 (November 2004), pp.1-30.
DOI
|
4 |
D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using Oneway Function Trees, Tech. Rep. No. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md.
|
5 |
A. N. Pour, K. Kumekawa, T. Kato, S. Itoh, A Hierarchical Group Key Management Scheme for Secure Multicast increasing Efficiency of Key Distribution in Leave Operation, Computer Networks 51 (August 2007), pp.4727-4743.
DOI
ScienceOn
|
6 |
D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, in: Proceedings Crypto 2001, Lecture Notes in Computer Science 2139 (August 2001), pp.213-229.
|
7 |
E. Fujisaki, T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, in: Proceedings Crypto 1999, pp.537-554.
|
8 |
G. M. Bertoni, L. Chen, P. Fragneto, K. A. Harrison, G. Pelosi, Computing Tate Pairing on Smartcards (2005). http://www.st.com/stonline/products/families/smartcard/ches2005\_v4.pdf.
|
9 |
D. R. Stinson. Cryptography Theory and Practice (3rd ed.) (Chapman & Hall/CRC, 2006).
|
10 |
M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, in: Proceedings ACM CCS (March 1996), pp.31-37.
|
11 |
M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for publickey encryption schemes, in: Proceedings Crypto'98 (1998) pp.26-45.
|
12 |
C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, C.-L. Lei, Secure Multicast in Dynamic Environments, Computer Networks 51 (July 2007), pp.2805-2817.
DOI
ScienceOn
|
13 |
L. Dondeti, S. Mukherjee, A. Samal, Scalable Secure One-to-many Group Communication Using Dual Encryption, Computer Communication 23 (July 1999) pp.1681-1701.
|
14 |
Y. Tsiounis, M. Yung, On the Security of ElGamal Based Encryption, in: Proceedings International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 1431 (February 1998), pp.117-134.
|
15 |
V. S. Miller, The Weil Pairing and Its Efficient Calculation, J. Cryptol. 17 (2004), pp.235-261.
|
16 |
Y. Zhang, Y. Fang, A Secure Authentication and Billing Architecture for Wireless Mesh Networks, Wireless Networks 13 (2007), pp.663-678.
DOI
ScienceOn
|
17 |
C. K. Wong, M. G. Gouda, and S. S. Lam, Secure Group Communications Using Key Graphs, in: Proceedings ACM SIGCOMM (September 1998), pp.68-79.
|
18 |
Y. Chiu, C. Lei, C. Huang, Secure Multicast Using Proxy Encryption, in: Proceedings International Conference on Information and Communications Security, Lecture Notes in Computer Science 3783 (December 2005), pp.280-290.
|
19 |
I. F. Akyildiz, X. Wang, W. Wang, Wireless Mesh Networks: A Survey, Computer Networks 47 (March 2005), pp.445-487.
DOI
ScienceOn
|
20 |
S. D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate Pairing, in: Proceedings 5th International Symposium on Algorithmic Number Theory, Lecture Notes in Computer Science 2369 (2002), pp.324-337.
|
21 |
A. Ivan, Y. Dodis, Proxy Cryptography Revisited, in: Proceedings Network and Distributed System Security Symposium (February 2003).
|
22 |
IEEE Std 802.16-2004, Air Interface for Broadband Wireless Access Systems, October 2004.
|
23 |
Y. J. Choie, E. Lee, Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2, in: Proceedings ICISC 2003, Lecture Notes in Computer Science 2971 (2004), pp.97-111.
|
24 |
J. Hwu, R. Chen, Y. Lin, An Efficient Identitybased Cryptosystem for End-to-end Mobile Security, IEEE Trans. on Wireless Communications 5 (September 2006), pp.2586-2593.
DOI
|
25 |
S. Mittra, Iolus: A Framework for Scalable Secure Multicasting, in: Proceeding ACM SIGCOMM (September 1997), pp.277-288.
|