Search Results

There are 19338 results for: content related to: Centralized group key management mechanism for VANET

  1. An efficient group key agreement protocol for secure P2P communication

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 3952–3965, Pandi Vijayakumar, Ramu Naresh, Lazarus Jegatha Deborah and SK Hafizul Islam

    Version of Record online : 22 AUG 2016, DOI: 10.1002/sec.1578

  2. The design of authentication key protocol in certificate-free public key cryptosystem

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2125–2133, Yu-Fang Chung

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.924

  3. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.607

  4. Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1026–1039, Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai and Xuemin (Sherman) Shen

    Version of Record online : 22 AUG 2014, DOI: 10.1002/sec.1057

  5. A key management architecture and protocols for secure smart grid communications

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3602–3617, Xuelian Long, David Tipper and Yi Qian

    Version of Record online : 25 JUL 2016, DOI: 10.1002/sec.1564

  6. On decentralized group key management mechanism for vehicular ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 241–247, Ming-Huang Guo, Horng-Twu Liaw, Meng-Yu Chiu and Der-Jiunn Deng

    Version of Record online : 4 JUN 2012, DOI: 10.1002/sec.541

  7. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  8. An effective key distribution for secure internet pay-TV using access key hierarchies

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5085–5097, Pandi Vijayakumar, Ramu Naresh, SK Hafizul Islam and Lazarus Jegatha Deborah

    Version of Record online : 27 OCT 2016, DOI: 10.1002/sec.1680

  9. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.966

  10. An efficient distributed key management scheme for group-signature based anonymous authentication in VANET

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 79–86, Yipin Sun, Zhenqian Feng, Qiaolin Hu and Jinshu Su

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.302

  11. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1027–1043, R. Aparna and B. B. Amberker

    Version of Record online : 4 OCT 2010, DOI: 10.1002/sec.250

  12. Provably secure group key agreement protocol based on ECDH with integrated signature

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1085–1102, Vankamamidi S. Naresh and Nistala V. E. S. Murthy

    Version of Record online : 29 DEC 2015, DOI: 10.1002/sec.1402

  13. LVAP: Lightweight V2I authentication protocol using group communication in VANETs

    International Journal of Communication Systems

    Yining Liu, Wei Guo, Qi Zhong and Gang Yao

    Version of Record online : 31 MAR 2017, DOI: 10.1002/dac.3317

  14. Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4289–4307, N Renugadevi and C Mala

    Version of Record online : 9 SEP 2015, DOI: 10.1002/sec.1342

  15. Improved group key transfer protocols from the protocol of Harn et al.

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1471–1477, Zhiwei Wang

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.415

  16. A key management scheme for secure group communication using binomial key trees

    International Journal of Network Management

    Volume 20, Issue 6, November/December 2010, Pages: 383–418, R. Aparna and B. B. Amberker

    Version of Record online : 31 AUG 2010, DOI: 10.1002/nem.742

  17. Password-authenticated cluster-based group key agreement for smart grid communication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 221–233, Hasen Nicanfar and Victor C. M. Leung

    Version of Record online : 1 MAR 2013, DOI: 10.1002/sec.726

  18. An authenticated group key distribution mechanism using theory of numbers

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 3502–3512, Yanjun Liu, Lein Harn and Chin-Chen Chang

    Version of Record online : 4 JUL 2013, DOI: 10.1002/dac.2569

  19. An ID-based node key management scheme based on PTPM in MANETs

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2816–2826, Guang Yang, Jiqiang Liu and Lei Han

    Version of Record online : 12 MAR 2015, DOI: 10.1002/sec.1206

  20. Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1363–1374, Qiuhua Wang, Huifang Chen, Lei Xie and Kuang Wang

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.429