共 50 条
- [1] Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 166 - 176
- [2] Automatic analysis of the security of XOR-based key management schemes TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 538 - +
- [5] A Survey of Key Predistribution Schemes for Key Management in Wireless Sensor Networks RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 135 - +
- [8] Estonian Electronic Identity Card: Security Flaws in Key Management PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1785 - 1802
- [10] Performance optimizations for group key management schemes 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 163 - 171