共 50 条
- [21] Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 306 - +
- [25] Provably Secure Key Assignment Schemes from Factoring INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 292 - 309
- [27] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170
- [28] On session key construction in provably-secure key establishment protocols PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
- [29] Provably-secure schemes for basic query support in outsourced databases DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 14 - +
- [30] A time-bound key management scheme for hierarchical tree PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 445 - +