[1]于明明, 宁玉桥, 沈诗雯, 等. 汽车网络安全实践性探索与研究[J]. 信息安全研究, 2023, 9(5): 476481[2]Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J]. IEEEACM Trans on Networking, 2000, 8(1): 1630[3]Wallner D, Harder E, Agee R. IETF RFC 2627 Key Management for Multicast: Issues and Architectures[EBOL]. 1999 [20240513]. https:www.rfceditor.orgrfcrfc2627.txt[4]Sherman A T, McGrew D A. Key establishment in large dynamic groups using oneway function trees[J]. IEEE Trans on Software Engineering, 2003, 29(5): 444458[5]Bruhadeshwar B, Kulkarni S S. Balancing revocation and storage tradeoffs in secure group communication[J]. IEEE Trans on Dependable and Secure Computing, 2009, 8(1): 5873[6]Yao W, Han S, Li X. LKH++ based group key management scheme for wireless sensor network[J]. Wireless Personal Communications, 2015, 83(4): 30573073[7]Tong X, Liu J, Wang Z, et al. Cluster space key management scheme based on threshold secret sharing and bilinear pairing[J]. International Journal of Satellite Communications and Networking, 2021, 39(6): 686704[8]Zhang L, Tan C. A novel group key management protocol based on secure key calculation code[C] Proc of IISA. Berlin: Springer, 2020: 689697[9]Li Y, Dhotre N S, Ohara Y, et al. Horus: Finegrained encryptionbased security for largescale storage[C] Proc of USENIX FAST’13. Berkeley, CA: USENIX Association, 2013: 147160[10]Srinivasan R, Vaidehi V, Rajaraman R, et al. Secure group key management scheme for multicast networks[J]. International Journal of Network Security, 2010, 11(1): 3338[11]Rawat A, Deshmukh M. Tree and elliptic curve based efficient and secure group key agreement protocol[J]. Journal of Information Security and Applications, 2020, 55: 102599[12]Du Xinjun, Wang Ying, Ge Jianhua, et al. An IDbased broadcast encryption scheme for key distribution[J]. IEEE Trans on Broadcasting, 2005, 51(2): 264266[13]Almajed H N, Almorgen A S. Simple and effective secure group communications in dynamic wireless sensor networks[J]. Sensors, 2019, 19(8): 710[14]Piao Yanji, JongUk Kim, Usman Tariq, et al. Polynomialbased key management for secure intragroup and intergroup communication[J]. Computers & Mathematics with Applications, 2013, 65(9): 13001309[15]Janani V S, Devaraju M. An efficient distributed secured broadcast stateless group key management scheme for mobile ad hoc networks[C] Proc of ACCAI. Piscataway, NJ: IEEE, 2022: 15
|