[1] |
LIU Qi, BAI Xiangyu.
DTN key management scheme for content delivery in remote area
[J]. Computer Engineering and Applications, 2018, 54(11): 81-85.
|
[2] |
LI Lanying, YI Chunhuan, SUN Jianda, LI Weijia.
Key management scheme based on unital for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(2): 94-98.
|
[3] |
SUN Xiaoling, SUN Xuguang, LI Shanshan, CHEN Fuming, YANG Qiuge.
Key management scheme for post-disaster road monitoring system
[J]. Computer Engineering and Applications, 2013, 49(2): 130-133.
|
[4] |
ZHOU Yimin, SHEN Jiajie.
Analysing and improving security of Zeroconf networks
[J]. Computer Engineering and Applications, 2013, 49(2): 141-144.
|
[5] |
DU Xiaoqiang1,2, BAO Wansu1.
Multicast key management scheme based on relationship of administrative subordination
[J]. Computer Engineering and Applications, 2013, 49(1): 101-106.
|
[6] |
LI Sujun, ZHOU Boqing, YANG Siqing.
Robust filtering false data scheme in sensor networks
[J]. Computer Engineering and Applications, 2012, 48(35): 67-70.
|
[7] |
WEN Ping1, MA Zhaofeng1,2, ZHAO Zhichao3, JIANG Ming1, NIU Xinxin1, YANG Yixian1.
Design and analysis of safety push VOD DRM system
[J]. Computer Engineering and Applications, 2012, 48(34): 69-75.
|
[8] |
MA Xinyu1, LONG Xiang1, FAN Xiubin2.
Construction and selection scheme of seeded-key database of collision-free CPK
[J]. Computer Engineering and Applications, 2012, 48(27): 99-104.
|
[9] |
MIAO Li, TAN Zhihua, ZHANG Dafang.
Effective model checking of network authentication protocol based on SPIN
[J]. Computer Engineering and Applications, 2012, 48(21): 62-67.
|
[10] |
YAN Haicheng, LI Hui, ZHANG Wen.
End-to-end key management based on IBE
[J]. Computer Engineering and Applications, 2012, 48(1): 116-119.
|
[11] |
ZHANG Juwei,ZHANG Liwen.
KMUIBC:Key management scheme for heterogeneous wireless sensor networks using identity-based cryptography
[J]. Computer Engineering and Applications, 2011, 47(5): 7-9.
|
[12] |
ZHOU Yuchuan,SHI Ronghua.
Key pre-distribution management scheme for clustering wireless sensor networks
[J]. Computer Engineering and Applications, 2011, 47(32): 105-107.
|
[13] |
LONG Xiao,WANG Jingcheng,ZHAO Guanglei,LUO Jian,ZHANG Qiuwen,ZHANG Zhenwei,HE Jun,ZHANG Mi.
Forward security research of key management scheme in wireless sensor networks
[J]. Computer Engineering and Applications, 2011, 47(25): 68-70.
|
[14] |
LIAO Yaohua,WANG Xiaoming.
Novel approach against node replication attacks in wireless sensor networks
[J]. Computer Engineering and Applications, 2011, 47(22): 64-67.
|
[15] |
TU Shanshan1,2,MA Chunbo1,AO Faliang1.
Polynomial group key management for ad hoc networks
[J]. Computer Engineering and Applications, 2011, 47(20): 77-80.
|