[1]
Akyildiz IF, Wang X, Wang W. Wireless mesh networks: a survey. Computer Networks. 2005, 47(2005): 445-487.
DOI: 10.1016/j.comnet.2004.12.001
Google Scholar
[2]
Rafaeli S, Hutchison D. A Survey of Key Management for Secure Group Communication, ACM Computing Surveys. 2003, 35(3): 309–329.
DOI: 10.1145/937503.937506
Google Scholar
[3]
Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.
DOI: 10.1109/90.836475
Google Scholar
[4]
Mittra S. Iolus: A Framework for Scalable Secure Multicasting, In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, ACM SIGCOMM, 1997, p.277–288.
DOI: 10.1145/263105.263179
Google Scholar
[5]
Diffie W, Hellman ME. New directions in cryptography. IEEE Transaction on Information Theory. 1976, 22: 644-654.
DOI: 10.1109/tit.1976.1055638
Google Scholar
[6]
Huang C, Chiu Y, Chen K, Lei C. Secure multicast in dynamic environments. Computer Networks. 2007, 51(2007): 2805-2817.
DOI: 10.1016/j.comnet.2006.11.027
Google Scholar
[7]
Chiu Y, Lei C, Huang C. Secure Multicast Using Proxy Encryption. Proceedings of International Conference on Information and Communications Security, ICICS 2005, Lecture Notes in Computer Science, vol. 3783, 2005, p.280–290.
DOI: 10.1007/11602897_24
Google Scholar
[8]
Hur J, Shin Y, Yoon H. Decentralized group key management for dynamic networks using proxy cryptography. Proceedings the 3rd ACM international workshop on QoS and security for wireless and mobile networks, (2007).
DOI: 10.1145/1298239.1298261
Google Scholar