Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…The powerful node acts as the group manager (GM), and is responsible for network security management, such as key issues, updating, revocation, intrusion detection, etc. Then, the authors reviewed and examined the scheme [212] in order to propose a scheme that considers the forward security, backward security, and collusion resistance. Based on the idea of access polynomial, the Sun et al scheme [156] is efficient in terms of storage, computation, and communication overhead compared to the schemes [250], [251], [252] , and [253], but not only the end-to-end delay and throughput are not evaluated compared to the scheme [79], also the replay attack is not considered.…”
Section: Authentication Protocols For Iosmentioning
confidence: 99%
“…In this scheme, users use the secret sharing to bind the user's capability of recovering lost session keys to the user's membership, but this scheme has high overheads of storage and communication. Then, based on the work in , several improved self‐healing key management schemes have been proposed .…”
Section: Introductionmentioning
confidence: 99%
“…With the concept of the access polynomial and one‐way hash chain, Xu et al proposed two self‐healing key distribution schemes in , but these two schemes cannot resist to the collusion attack of revoked users and new joined users. In , Duttal et al proposed an enhanced AP‐SKM scheme based on the one‐way hash chain and pre‐arranged life cycle, but application scenarios of this scheme are also constrained. To the best of our knowledge, the scheme proposed in is the best one among all of the existing AP‐SKM schemes .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations