2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.152
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Key Agreement Protocols in Group-User Systems

Abstract: In recent years, the ubiquity of communication networks speed up the development of wireless network and the Internet applications. In addition to the common service provided by the telecommunication enterprise, how to connect some distinct users to form a network which allow them to deal with their own works is a popular topic that many scholars engage in, [1] [2] [8]. When constructing the network, the key management is the most important problem that each system has to solve. There are many key agreement pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 11 publications
0
0
0
Order By: Relevance