References
- Sandro Rafaeli and David Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, Vol. 35, No. 3, pp. 309-329, Sep. 2003. https://doi.org/10.1145/937503.937506
- Eric Ke Wand, Yuming Ye, and Xiaofei Xu, "Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Netwok," Internation Journal of Distributed Sensor Networks, 2014.
- Junbeom Hur and Hyunsoo Yoon, “A Decentralized Multi-Group Key Management Scheme,” IEICE Trans. Communications, Vol. E92-B, No. 2, pp. 632-635, Feb. 2009. https://doi.org/10.1587/transcom.E92.B.632
- Chang-Oh Kim, Kyungran Kang and Young-Jong Cho, “A Distributed Multicast Group Key Management Scheme for a Hierarchically Structured Network,” Journal of KIISE, Vol. 38, No. 1, pp. 22-32, Feb. 2011.
- Farooq Anjum, "Location Dependent Key Management in Sensor Networks without Using Deployment Knowledge," Wireless Network, pp. 1587-1600, Oct. 2008.
- C. K. Wong, M. Gouda, S. S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Trans. Networking, Vol. 8, pp. 16-31, Feb. 2000. https://doi.org/10.1109/90.836475
- Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G. Tsudik, “Secure Group Communication Using Robust Contributory Key Agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, 2004. https://doi.org/10.1109/TPDS.2004.1278104
- Mark Manulis, "Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups," Mobile Adhoc and Sensor Systems Conference, Dec. 2005.
- Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Communications, Vol. 30 pp. 2314-2341, 2007. https://doi.org/10.1016/j.comcom.2007.04.009
- R. D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW : A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003.
- T. Aurisch, "Using Key Trees for Securing Military Multicast Communication," IEEE Milcom 04, 2004.
- T. Aurisch, "Optimization Techniques for Military Multicast Key Management," IEEE Milcom 05, 2005.